The Danger Within: Insider Threat Modeling Using Business Process Models

被引:0
作者
von der Assen, Jan [1 ]
Hochuli, Jasmin [1 ]
Grubl, Thomas [1 ]
Stiller, Burkhard [1 ]
机构
[1] Univ Zurich UZH, Dept Informat, Commun Syst Grp, CH-8050 Zurich, Switzerland
来源
2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR | 2024年
关键词
Threat Modeling; Insider Threats; Risk Management; Business Process Modeling; BPMN;
D O I
10.1109/CSR61664.2024.10679492
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threat modeling has been successfully applied to model technical threats within information systems. However, a lack of methods focusing on non-technical assets and their representation can be observed in theory and practice. Following the voices of industry practitioners, this paper explored how to model insider threats based on business process models. Hence, this study developed a novel insider threat knowledge base and a threat modeling application that leverages Business Process Modeling and Notation (BPMN). Finally, to understand how well the theoretic knowledge and its prototype translate into practice, the study conducted a real-world case study of an IT provider's business process and an experimental deployment for a real voting process. The results indicate that even without annotation, BPMN diagrams can be leveraged to automatically identify insider threats in an organization.
引用
收藏
页码:186 / 192
页数:7
相关论文
共 50 条
  • [1] Modeling variability in business process models using UML
    Razavian, Maryam
    Khosravi, Ramtin
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 82 - 87
  • [2] Insider threat analysis using information-centric modeling
    Ha, D.
    Upadhyaya, S.
    Ngo, H.
    Pramanik, S.
    Chinchani, R.
    Mathew, S.
    ADVANCES IN DIGITAL FORENSIC III, 2007, 242 : 55 - +
  • [3] Insider Threat Modeling: An Adversarial Risk Analysis Approach
    Joshi, Chaitanya
    Aliaga, Jesus Rios
    Insua, David Rios
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 1131 - 1142
  • [4] Integration of Risk Aspects into Business Process Modeling
    Anton, Tobias
    Lackes, Richard
    Siepermann, Markus
    INNOVATIONS IN ENTERPRISE INFORMATION SYSTEMS MANAGEMENT AND ENGINEERING, 2016, 245 : 46 - 61
  • [5] Business process modeling within the digital economy development framework
    Akimov, S. S.
    PROCEEDINGS OF THE 1ST INTERNATIONAL SCIENTIFIC CONFERENCE MODERN MANAGEMENT TRENDS AND THE DIGITAL ECONOMY: FROM REGIONAL DEVELOPMENT TO GLOBAL ECONOMIC GROWTH (MTDE 2019), 2019, 81 : 262 - 267
  • [6] A Review of the Insider Threat, a Practitioner Perspective Within the UK Financial Services
    Whitelaw, Findlay
    Riley, Jackie
    Elmrabit, Nebrase
    IEEE ACCESS, 2024, 12 : 34752 - 34768
  • [7] Business process modeling using TAD methodology
    Peter, B
    Talib, D
    Peter, V
    ITI 2003: PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES, 2003, : 101 - 106
  • [8] Business process modeling for processing classified documents using RFID technology
    Koszela, Jarostaw
    20TH INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATIONS AND COMPUTERS (CSCC 2016), 2016, 76
  • [9] Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis
    Kummueller, Florian
    Probst, Christian W.
    2014 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW 2014), 2014, : 229 - 235
  • [10] Using business process models for the specification of manufacturing operations
    Erasmus, Jonnro
    Vanderfeesten, Irene
    Traganos, Konstantinos
    Grefen, Paul
    COMPUTERS IN INDUSTRY, 2020, 123