Enemies within: Redefining the insider threat in organizational security policy

被引:0
|
作者
David S Wall
机构
[1] Criminology,
[2] SASS,undefined
[3] Durham University,undefined
来源
Security Journal | 2013年 / 26卷
关键词
information security; security policy; cybercrime; organizations; insider threat;
D O I
暂无
中图分类号
学科分类号
摘要
The critical importance of electronic information exchanges in the daily operation of most large modern organizations is causing them to broaden their security provision to include the custodians of exchanged data – the insiders. The prevailing data loss threat model mainly focuses upon the criminal outsider and mainly regards the insider threat as ‘outsiders by proxy’, thus shaping the relationship between the worker and workplace in information security policy. A policy that increasingly takes the form of social policy for the information age as it acquires the power to include and exclude sections of society and potentially to re-stratify it? This article draws upon empirical sources to critically explore the insider threat in organizations. It looks at the prevailing threat model before deconstructing ‘the insider’ into various risk profiles, including the well-meaning insider, before drawing conclusions about what the building blocks of information security policy around the insider might be.
引用
收藏
页码:107 / 124
页数:17
相关论文
共 50 条
  • [21] Algorithm of optimal security hardening measures against insider threat
    Chen, Xiaojun
    Shi, Jinqiao
    Xu, Fei
    Pu, Yiguo
    Guo, Li
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (07): : 1565 - 1577
  • [22] Security by Compliance? A Study of Insider Threat Implications for Nigerian Banks
    Fagade, Tesleem
    Tryfonas, Theo
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY, AND TRUST, 2016, 9750 : 128 - 139
  • [23] A Structured Approach to Insider Threat Monitoring for Offensive Security Teams
    Al Sadi, Amir
    Berardi, Davide
    Callegati, Franco
    Melis, Andrea
    Prandini, Marco
    Tolomei, Luca
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [24] Mitigating Insider Threat: A Neural Network Approach for Enhanced Security
    Lavanya, P.
    Glory, H. Anila
    Sriram, V. S. Shankar
    IEEE ACCESS, 2024, 12 : 73752 - 73768
  • [25] Enterprise Level Security: Insider Threat Counter-Claims
    Simpson, William R.
    Foltz, Kevin E.
    WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2017, VOL I, 2017, : 112 - 117
  • [26] Information security insider threat visualization: Theft of intellectual property
    Zaytsev, A.S.
    Malyuk, A.A.
    Scientific Visualization, 2015, 7 (03): : 53 - 68
  • [27] Confronting Information Security's Elephant, the Unintentional Insider Threat
    Canham, Matthew
    Posey, Clay
    Bockelman, Patricia S.
    AUGMENTED COGNITION. HUMAN COGNITION AND BEHAVIOR, AC 2020, PT II, 2020, 12197 : 316 - 334
  • [28] Organizational Vulnerability to Insider Threat What Do Australian Experts Say?
    Bedford, Justine
    Van Der Laan, Luke
    HCI INTERNATIONAL 2016 - POSTERS' EXTENDED ABSTRACTS, PT I, 2016, 617 : 465 - 470
  • [29] The threat within: Deregulation and energy security
    Buchan, D
    SURVIVAL, 2002, 44 (03) : 105 - +
  • [30] THE REAL SECURITY THREAT - THE ENEMY WITHIN
    ALEXANDER, M
    DATAMATION, 1995, 41 (13): : 30 - &