Privileged Account Management Approach for Preventing Insider Attacks

被引:0
|
作者
Sindiren, Erhan [1 ]
Ciylan, Bunyamin [2 ]
机构
[1] Gazi Univ, Inst Informat, Dept Comp Forens, TR-06680 Ankara, Turkey
[2] Gazi Univ, Fac Technol, Comp Engn, TR-06560 Ankara, Turkey
关键词
insider attacks; privileged account management; password security; risk management; digital identity management; access control;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The companies gradually increase their safety precautions towards protecting their information systems, but the attackers simultaneously explore many different methods for breaching or bypassing the safety precautions. In this cycle, the attacks to information systems are expected from outside, and the cyber security investments are made in this parallel. As a result of this, the companies are caught unprepared for these conscious or unconscious breaches. In order to achieve their goals in insider attacks, the attackers attempt to seize the privileged accounts, which have much more authorizations on the information systems than the normal accounts. The reason for targeting the privileged account is that these accounts have wide authorizations on the information systems. IT personnel are responsible for realizing and managing the cyber security precautions within the company. In general, the IT personnel do the same mistake by adopting the general approach; they expect the attacks from outsiders and ignore the insider threats. The most important one among these threats is the seizure of privileged accounts, which is used by the IT personnel every day, by the attackers. The measures to be taken for preventing the malicious use of privileged accounts and the approach to be adopted in order to increase awareness of IT personnel are discussed in this paper.
引用
收藏
页码:33 / 42
页数:10
相关论文
共 50 条
  • [11] An Architectural approach to preventing code injection attacks
    Riley, Ryan
    Jiang, Xuxian
    Xu, Dongyan
    [J]. 37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2007, : 30 - +
  • [12] An approach for detecting and preventing DDoS attacks in campus
    Merouane M.
    [J]. Merouane, Mehdi (mmehdi_m@hotmail.com), 1600, Springer Science and Business Media, LLC (51): : 13 - 23
  • [13] Privileged migrants and their sense of belonging: Insider or outsider?
    Ullah, A. K. M. Ahsan
    Hasan, Noor Hasharina
    Mohamad, Siti Mazidah
    Chattoraj, Diotima
    [J]. ASIAN JOURNAL OF SOCIAL SCIENCE, 2021, 49 (03) : 161 - 169
  • [14] The influence of insider law on preventing insider information leakage
    Li, Guangshuai
    Bi, Ying
    [J]. Metallurgical and Mining Industry, 2015, 7 (09): : 446 - 451
  • [15] Addressing insider attacks via forensic-ready risk management
    Daubner, Lukas
    Macak, Martin
    Matulevicius, Raimundas
    Buhnova, Barbora
    Maksovic, Sofija
    Pitner, Tomas
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 73
  • [16] Complexity of Insider Attacks to Databases
    Kul, Gokhan
    Upadhyaya, Shambhu
    Hughes, Andrew
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS (MIST'17), 2017, : 25 - 32
  • [17] Detector + : An approach for detecting, isolating, and preventing timing attacks
    Javeed, Arsalan
    Yilmaz, Cemal
    Savas, Erkay
    [J]. COMPUTERS & SECURITY, 2021, 110
  • [18] A Proactive Approach to Preventing Phishing Attacks Using a Pshark
    Shah, Ripan
    Trevathan, Jarrod
    Read, Wayne
    Ghodosi, Hossein
    [J]. PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 915 - 921
  • [19] Detecting and Preventing SQL Injection Attacks: A Formal Approach
    Qbea'h, Mohammad
    Alshraideh, Mohammad
    Sabri, Khair Eddin
    [J]. 2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC), 2016, : 123 - 129
  • [20] Insider attacks: human-factors attacks and mitigation
    Abulencia, Jesse
    [J]. Computer Fraud and Security, 2021, 2021 (05): : 14 - 17