Addressing the Insider Threat Introduction

被引:10
|
作者
Pfleeger, Shari Lawrence [1 ]
Stolfo, Salvatore J. [2 ]
机构
[1] RAND Corp, Santa Monica, CA 90406 USA
[2] Columbia Univ, New York, NY 10027 USA
关键词
Behavior; Human factors; Insider threat; Modeling;
D O I
10.1109/MSP.2009.146
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In their guest editors' introduction to the special issue on Insider Threat, Shari Lawrence Pfleeger and Salvatore Stolfo describe a taxonomy of insiders and their unwelcome actions, as well as the need for credible data to document the size and nature of the insider threat. They suggest that the three articles in the special issue shed light not only on how to generate data for further study but also on how to use the data in models that can help evaluate the likely effects of various responses. The introduction ends with a matrix showing the variety of sensible and effective responses that must be sensitive to the organizations, systems, environments, and individuals involved with inappropriate insider behavior. © 2009 IEEE.
引用
收藏
页码:10 / 13
页数:4
相关论文
共 50 条
  • [41] BALANCING OUR APPROACH TO THE INSIDER THREAT
    Franz, David R.
    LeDuc, James W.
    BIOSECURITY AND BIOTERRORISM-BIODEFENSE STRATEGY PRACTICE AND SCIENCE, 2011, 9 (03) : 205 - 206
  • [42] Cybersecurity: Revisiting the definition of insider threat
    Beebe, Nicole Lang
    Chang, Frederick R.
    Bridge, 1600, 49 (03): : 12 - 19
  • [43] Review on Insider Threat Detection Techniques
    Oladimeji, T. O.
    Ayo, C. K.
    Adewumi, S. E.
    3RD INTERNATIONAL CONFERENCE ON SCIENCE AND SUSTAINABLE DEVELOPMENT (ICSSD 2019): SCIENCE, TECHNOLOGY AND RESEARCH: KEYS TO SUSTAINABLE DEVELOPMENT, 2019, 1299
  • [44] The insider threat to nuclear safety and security
    Andrew N Healey
    Security Journal, 2016, 29 : 23 - 38
  • [45] Insider Threat Detection and Cloud Computing
    Choudhary, Arjun
    Bhadada, Rajesh
    ADVANCES IN DATA AND INFORMATION SCIENCES, 2022, 318 : 81 - 90
  • [46] Scalable predicting model for insider threat
    College of Computer Science and Technology, Jilin University, Changchun 130012, China
    不详
    Jisuanji Xuebao, 2006, 8 (1346-1355):
  • [47] Towards a theory of insider threat assessment
    Chinchani, R
    Iyer, A
    Ngo, HQ
    Upadhyaya, S
    2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 108 - 117
  • [48] Insider Threat Identification by Process Analysis
    Bishop, Matt
    Conboy, Heather M.
    Phan, Huong
    Simidchieva, Borislava I.
    Avrunin, George S.
    Clarke, Lori A.
    Osterweil, Leon J.
    Peisert, Sean
    2014 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW 2014), 2014, : 251 - 264
  • [49] Data theft: A prototypical insider threat
    McCormick, Michael
    INSIDER ATTACK AND CYBER SECURITY: BEYOND THE HACKER, 2008, 39 : 53 - 68
  • [50] The Dynamic Nature of Insider Threat Indicators
    Frank L. Greitzer
    Justin Purl
    SN Computer Science, 2022, 3 (2)