Privileged Account Management Approach for Preventing Insider Attacks

被引:0
|
作者
Sindiren, Erhan [1 ]
Ciylan, Bunyamin [2 ]
机构
[1] Gazi Univ, Inst Informat, Dept Comp Forens, TR-06680 Ankara, Turkey
[2] Gazi Univ, Fac Technol, Comp Engn, TR-06560 Ankara, Turkey
关键词
insider attacks; privileged account management; password security; risk management; digital identity management; access control;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The companies gradually increase their safety precautions towards protecting their information systems, but the attackers simultaneously explore many different methods for breaching or bypassing the safety precautions. In this cycle, the attacks to information systems are expected from outside, and the cyber security investments are made in this parallel. As a result of this, the companies are caught unprepared for these conscious or unconscious breaches. In order to achieve their goals in insider attacks, the attackers attempt to seize the privileged accounts, which have much more authorizations on the information systems than the normal accounts. The reason for targeting the privileged account is that these accounts have wide authorizations on the information systems. IT personnel are responsible for realizing and managing the cyber security precautions within the company. In general, the IT personnel do the same mistake by adopting the general approach; they expect the attacks from outsiders and ignore the insider threats. The most important one among these threats is the seizure of privileged accounts, which is used by the IT personnel every day, by the attackers. The measures to be taken for preventing the malicious use of privileged accounts and the approach to be adopted in order to increase awareness of IT personnel are discussed in this paper.
引用
收藏
页码:33 / 42
页数:10
相关论文
共 50 条
  • [1] Preventing Insider Attacks in the Cloud
    Sundararajan, Sudharsan
    Narayanan, Hari
    Pavithran, Vipin
    Vorungati, Kaladhar
    Achuthan, Krishnashree
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 488 - +
  • [2] A New Approach for Detection of Insider Attacks
    Sen, Sevil
    [J]. 2013 21ST SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2013,
  • [3] Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks
    Liu, Yu
    Squires, Matthew R.
    Taylor, Curtis R.
    Walls, Robert J.
    Shue, Craig A.
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 26 - 46
  • [4] Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics
    Eberz, Simon
    Rasmussen, Kasper B.
    Lenders, Vincent
    Martinovic, Ivan
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [5] A Protocol for Preventing Insider Attacks in Untrusted Infrastructure-as-a-Service Clouds
    Khan, Imran
    Anwar, Zahid
    Bordbar, Behzad
    Ritter, Eike
    Rehman, Habib-ur
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (04) : 942 - 954
  • [6] An Approach for Preventing and Detecting Attacks in the Cloud
    Merino, Louis-Henri
    Cukier, Michel
    [J]. 2020 IEEE/ACM 13TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC 2020), 2020, : 165 - 175
  • [7] An approach for detecting encrypted insider attacks on OpenFlow SDN Networks
    Neu, Charles V.
    Zorzo, Avelino F.
    Orozco, Alex M. S.
    Michelin, Regio A.
    [J]. 2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 210 - 215
  • [8] Organizations' readiness for insider attacks: A process-oriented approach
    AlGhamdi, Azzah A.
    Niazi, Mahmood
    Alshayeb, Mohammad
    Mahmood, Sajjad
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2024, 54 (08): : 1565 - 1589
  • [9] An Architectural Approach to Preventing Code Injection Attacks
    Riley, Ryan
    Jiang, Xuxian
    Xu, Dongyan
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2010, 7 (04) : 351 - 365
  • [10] Combinatorial Approach for Preventing SQL Injection Attacks
    Ezumalai, R.
    Aghila, G.
    [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1212 - 1217