Modelling of Enterprise Insider Threats

被引:0
作者
Roy, Puloma [1 ]
Mazumdar, Chandan [1 ]
机构
[1] Jadavpur Univ, Ctr Distributed Comp, Kolkata, India
来源
2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP) | 2015年
关键词
Insider Threat; Insider Attacker; Enterprise;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a position has been taken to include the non-human active agents as insiders of an enterprise, as opposed to only human insiders as found in the literature. This eliminates the necessity of including the psycho-social and criminological behavioural traits to be incorporated in the management of insider threats. A framework of an Enterprise has been developed and it is shown that within the framework, both the human and non-human agents can be modelled as insider threats in a uniform manner. An example case has been analysed as supporting evidences for the point of view.
引用
收藏
页码:132 / 136
页数:5
相关论文
共 16 条
[1]  
Althebyan Q., 2008, 3 INT C DIG INF MAN
[2]  
Bishop M., 2010, INSIDER THREATS CYBE
[3]  
Bishop M., 2008, WORKSH NEW SEC PAR
[4]  
CERT Cyber Security Watch Survey, 2013, BAD IS INS THREAT
[5]  
Coles-Kemp L., 2010, Insider Threats in Cyber Security
[6]  
Eberle W., 2009, CYB SEC APPL TECHN C
[7]  
Greitzer F., 2009, Predictive modeling for insider threat mitigation
[8]  
Greitzer F.L., 2010, Identifying at-Risk Employees: A Behavioral Model for Predicting Potential Insider Threats
[9]  
Greitzer FL., 2011, J STRATEGIC SECURITY
[10]  
Legg P., 2013, J WIRELESS MOBILE NE