The role risk-management plays in reducing insider threat's in the federal Government

被引:2
作者
Stone, Alexander Gregory [1 ]
机构
[1] Univ Maryland Univ Coll, Business Adm Dept, Adelphi, MD USA
来源
INFORMATION SECURITY JOURNAL | 2022年 / 31卷 / 03期
关键词
Cybersecurity; risk-management; insider threat; risk analysis; federal government; INFORMATION SECURITY;
D O I
10.1080/19393555.2021.1998735
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, organizations face a growing cybersecurity threats to their IT infrastructure. The ever expanding remote-workforce has made the risk of insider-threats even more dangerous. How can organizations be better prepared to handle the risk of the next insider-threat? The Federal Government is no different, as one of the largest employer's in the world, the growing risk of an insider-threat is always present. In a systematic review, the evidence will identify how Federal agencies can utilize risk-management to be better prepared to combat an insider-threat. Recommendations will be made to help Federal agencies be on the lookout for the next viable insider-threat.
引用
收藏
页码:338 / 345
页数:8
相关论文
共 30 条
[21]  
Morgan S., 2016, FORBECOM
[22]  
Oncioiu I., 2014, Acta Universitatis Danubius: Oeconomica, V10, P160
[23]  
Richardson M.D., 2020, ED PLANNING, V27, P23
[24]   Study on Inside Threats Based on Analytic Hierarchy Process [J].
Seo, Sang ;
Kim, Dohoon .
SYMMETRY-BASEL, 2020, 12 (08)
[25]  
Simpson W.R., 2018, IAENG INT J COMPUTER, V45, P83
[26]   The role of internal audit and user training in information security policy compliance [J].
Stafford, Thomas ;
Deitz, George ;
Li, Yaojie .
MANAGERIAL AUDITING JOURNAL, 2018, 33 (04) :410-424
[27]   A data analytical approach for assessing the efficacy of Operational Technology active defenses against insider threats [J].
Sundaram, Arvind ;
Abdel-Khalik, Hany S. ;
Ashy, Oussama .
PROGRESS IN NUCLEAR ENERGY, 2020, 124
[28]   Methods for the thematic synthesis of qualitative research in systematic reviews [J].
Thomas, James ;
Harden, Angela .
BMC MEDICAL RESEARCH METHODOLOGY, 2008, 8 (1)
[29]   Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior [J].
Weems, Carl F. ;
Ahmed, Irfan ;
Richard, Golden G., III ;
Russell, Justin D. ;
Neill, Erin L. .
PLOS ONE, 2018, 13 (12)
[30]   Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider [J].
Zhurin, Sergey Igorevich .
JOURNAL OF ICT RESEARCH AND APPLICATIONS, 2015, 8 (03) :251-269