The role risk-management plays in reducing insider threat's in the federal Government

被引:2
作者
Stone, Alexander Gregory [1 ]
机构
[1] Univ Maryland Univ Coll, Business Adm Dept, Adelphi, MD USA
来源
INFORMATION SECURITY JOURNAL | 2022年 / 31卷 / 03期
关键词
Cybersecurity; risk-management; insider threat; risk analysis; federal government; INFORMATION SECURITY;
D O I
10.1080/19393555.2021.1998735
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, organizations face a growing cybersecurity threats to their IT infrastructure. The ever expanding remote-workforce has made the risk of insider-threats even more dangerous. How can organizations be better prepared to handle the risk of the next insider-threat? The Federal Government is no different, as one of the largest employer's in the world, the growing risk of an insider-threat is always present. In a systematic review, the evidence will identify how Federal agencies can utilize risk-management to be better prepared to combat an insider-threat. Recommendations will be made to help Federal agencies be on the lookout for the next viable insider-threat.
引用
收藏
页码:338 / 345
页数:8
相关论文
共 30 条
[1]  
Abomhara M., 2015, Journal of Cyber Security and Mobility, P65
[2]  
Akinwumi D.A., 2017, Nigerian Journal of Technology, V36, P1271, DOI DOI 10.4314/NJT.V36I4.38
[3]   A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations [J].
Al-Mhiqani, Mohammed Nasser ;
Ahmad, Rabiah ;
Zainal Abidin, Z. ;
Yassin, Warusia ;
Hassan, Aslinda ;
Abdulkareem, Karrar Hameed ;
Ali, Nabeel Salih ;
Yunos, Zahri .
APPLIED SCIENCES-BASEL, 2020, 10 (15)
[4]   Organizational information security as a complex adaptive system: insights from three agent-based models [J].
Burns, A. J. ;
Posey, Clay ;
Courtney, James F. ;
Roberts, Tom L. ;
Nanayakkara, Prabhashi .
INFORMATION SYSTEMS FRONTIERS, 2017, 19 (03) :509-524
[5]   Research synthesis in software engineering: A tertiary study [J].
Cruzes, Daniela S. ;
Dyba, Tore .
INFORMATION AND SOFTWARE TECHNOLOGY, 2011, 53 (05) :440-455
[6]   Personnel risk management assessment for newly emerging forms of employee crimes [J].
Cunningham, Michael R. ;
Jones, John W. ;
Dreschler, Brian W. .
INTERNATIONAL JOURNAL OF SELECTION AND ASSESSMENT, 2018, 26 (01) :5-16
[7]   Accounting and Cybersecurity Risk Management [J].
Eaton, Tim V. ;
Grenier, Jonathan H. ;
Layman, David .
CURRENT ISSUES IN AUDITING, 2019, 13 (02) :C1-C9
[8]  
Elifoglu IH, 2018, REV BUS, V38, P61
[9]   How Disclosing a Prior Cyberattack Influences the Efficacy of Cybersecurity Risk Management Reporting and Independent Assurance [J].
Frank, Michele L. ;
Grenier, Jonathan H. ;
Pyzoha, Jonathan S. .
JOURNAL OF INFORMATION SYSTEMS, 2019, 33 (03) :183-200
[10]   Security threats to critical infrastructure: the human factor [J].
Ghafir, Ibrahim ;
Saleem, Jibran ;
Hammoudeh, Mohammad ;
Faour, Hanan ;
Prenosil, Vaclav ;
Jaf, Sardar ;
Jabbar, Sohail ;
Baker, Thar .
JOURNAL OF SUPERCOMPUTING, 2018, 74 (10) :4986-5002