Addressing the Insider Threat Introduction

被引:10
|
作者
Pfleeger, Shari Lawrence [1 ]
Stolfo, Salvatore J. [2 ]
机构
[1] RAND Corp, Santa Monica, CA 90406 USA
[2] Columbia Univ, New York, NY 10027 USA
关键词
Behavior; Human factors; Insider threat; Modeling;
D O I
10.1109/MSP.2009.146
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In their guest editors' introduction to the special issue on Insider Threat, Shari Lawrence Pfleeger and Salvatore Stolfo describe a taxonomy of insiders and their unwelcome actions, as well as the need for credible data to document the size and nature of the insider threat. They suggest that the three articles in the special issue shed light not only on how to generate data for further study but also on how to use the data in models that can help evaluate the likely effects of various responses. The introduction ends with a matrix showing the variety of sensible and effective responses that must be sensitive to the organizations, systems, environments, and individuals involved with inappropriate insider behavior. © 2009 IEEE.
引用
收藏
页码:10 / 13
页数:4
相关论文
共 50 条
  • [31] A Method of Evaluation for Insider Threat
    Wang, Yi-Lu
    Yang, Sang-Chin
    2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 438 - 441
  • [32] Survival analysis for insider threat Detecting insider threat incidents using survival analysis techniques
    Alhajjar, Elie
    Bradley, Taylor
    COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2022, 28 (04) : 335 - 351
  • [33] Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat
    Legg, Philip A.
    Buckley, Oliver
    Goldsmith, Michael
    Creese, Sadie
    2015 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2015,
  • [34] Insider Threat Program Best Practices
    Guido, Mark D.
    Brooks, Marc W.
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 1831 - 1839
  • [35] Cybercrime Countermeasure of Insider Threat Investigation
    Kao, Da-Yu
    2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 413 - 418
  • [36] Aspectising honeytokens to contain the insider threat
    Padayachee, Keshnee
    IET INFORMATION SECURITY, 2015, 9 (04) : 240 - 247
  • [37] Weak models for insider threat detection
    Thompson, P
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE(C31) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE III, PTS 1 AND 2, 2004, 5403 : 40 - 48
  • [38] The insider threat to nuclear safety and security
    Healey, Andrew N.
    SECURITY JOURNAL, 2016, 29 (01) : 23 - 38
  • [39] Modeling the emergence of insider threat vulnerabilities
    Martinez-Moyano, Ignacio J.
    Rich, Eliot H.
    Conrad, Stephen H.
    Andersen, David F.
    PROCEEDINGS OF THE 2006 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2006, : 562 - +
  • [40] Contrastive Learning for Insider Threat Detection
    Vinay, M. S.
    Yuan, Shuhan
    Wu, Xintao
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2022, PT I, 2022, : 395 - 403