Enemies within: Redefining the insider threat in organizational security policy

被引:0
|
作者
David S Wall
机构
[1] Criminology,
[2] SASS,undefined
[3] Durham University,undefined
来源
Security Journal | 2013年 / 26卷
关键词
information security; security policy; cybercrime; organizations; insider threat;
D O I
暂无
中图分类号
学科分类号
摘要
The critical importance of electronic information exchanges in the daily operation of most large modern organizations is causing them to broaden their security provision to include the custodians of exchanged data – the insiders. The prevailing data loss threat model mainly focuses upon the criminal outsider and mainly regards the insider threat as ‘outsiders by proxy’, thus shaping the relationship between the worker and workplace in information security policy. A policy that increasingly takes the form of social policy for the information age as it acquires the power to include and exclude sections of society and potentially to re-stratify it? This article draws upon empirical sources to critically explore the insider threat in organizations. It looks at the prevailing threat model before deconstructing ‘the insider’ into various risk profiles, including the well-meaning insider, before drawing conclusions about what the building blocks of information security policy around the insider might be.
引用
收藏
页码:107 / 124
页数:17
相关论文
共 50 条
  • [1] Enemies within: Redefining the insider threat in organizational security policy
    Wall, David S.
    SECURITY JOURNAL, 2013, 26 (02) : 107 - 124
  • [2] Behavioral and policy issues in information systems security: the insider threat
    Warkentin, Merrill
    Willison, Robert
    EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2009, 18 (02) : 101 - 105
  • [3] Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat
    Buckley, Oliver
    Nurse, Jason R. C.
    Legg, Philip A.
    Goldsmith, Michael
    Creese, Sadie
    2014 4TH WORKSHOP ON SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST (STAST 2014), 2014, : 8 - 15
  • [4] The insider threat to nuclear safety and security
    Healey, Andrew N.
    SECURITY JOURNAL, 2016, 29 (01) : 23 - 38
  • [5] The insider threat to nuclear safety and security
    Andrew N Healey
    Security Journal, 2016, 29 : 23 - 38
  • [6] SOFIT: Sociotechnical and Organizational Factors for Insider Threat
    Greitzer, Frank L.
    Purl, Justin
    Leong, Yung Mei
    Becker, D. E.
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 197 - 206
  • [7] Balancing Organizational Incentives to Counter Insider Threat
    Moore, Andrew P.
    Cassidy, Tracy M.
    Theis, Michael C.
    Bauer, Daniel
    Rousseau, Denise M.
    Moore, Susan B.
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 237 - 246
  • [8] Conversations around Organizational Risk and Insider Threat
    Osterritter, Luke
    Carley, Kathleen M.
    PROCEEDINGS OF THE 2021 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING, ASONAM 2021, 2021, : 613 - 621
  • [9] The Trend of the Security Research for the Insider Cyber Threat
    Hong, Jaeseung
    Kim, Jongwung
    Cho, Jeonghun
    SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 100 - 107
  • [10] Outsourcing and the insider threat: An increasing security risk
    Colwill, Carl
    3RD INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, PROCEEDINGS, 2008, : 77 - 86