A multi-tiered framework for insider threat prevention

RA Alsowail, T Al-Shehari - Electronics, 2021 - mdpi.com
As technologies are rapidly evolving and becoming a crucial part of our lives, security and
privacy issues have been increasing significantly. Public and private organizations have …

Impact and key challenges of insider threats on organizations and critical businesses

N Saxena, E Hayes, E Bertino, P Ojo, KKR Choo… - Electronics, 2020 - mdpi.com
The insider threat has consistently been identified as a key threat to organizations and
governments. Understanding the nature of insider threats and the related threat landscape …

Inside the insider

GL Sanders, S Upadhyaya… - IEEE Engineering …, 2019 - ieeexplore.ieee.org
We present an overview of two major research projects on the role of monetary incentives
and psychological traits in attracting individuals to hacking behavior. In the first study …

[HTML][HTML] VISTA: An inclusive insider threat taxonomy, with mitigation strategies

K Renaud, M Warkentin, G Pogrebna… - Information & …, 2024 - Elsevier
Insiders have the potential to do a great deal of damage, given their legitimate access to
organisational assets and the trust they enjoy. Organisations can only mitigate insider …

[图书][B] Insider threat: Prevention, detection, mitigation, and deterrence

MG Gelles - 2016 - books.google.com
Insider Threat: Detection, Mitigation, Deterrence and Prevention presents a set of solutions
to address the increase in cases of insider threat. This includes espionage, embezzlement …

Controlling insider threats with information security policies

A Yayla - 2011 - aisel.aisnet.org
Over the past decade, several studies, industry reports and surveys have revealed that
insider threats constitute a significant role in information security. Following the literature, we …

Addressing the insider threat

SL Pfleeger, SJ Stolfo - IEEE Security & Privacy, 2009 - ieeexplore.ieee.org
In their guest editors' introduction to the special issue on Insider Threat, Shari Lawrence
Pfleeger and Salvatore Stolfo describe a taxonomy of insiders and their unwelcome actions …

Positioning your organization to respond to insider threats

FL Greitzer, J Purl, YM Leong… - IEEE Engineering …, 2019 - ieeexplore.ieee.org
Insider threats refer to actions by trusted individuals that directly or indirectly bring harm to
the organization or expose the organization to external risks. Insider threat detection …

Introduction to the special issue on insider threat modeling and simulation

AP Moore, KA Kennedy, TJ Dover - Computational and Mathematical …, 2016 - Springer
Despite the high impact of insider attacks, findings show that many organizations have no
insider threat program in place, and most programs that do exist have serious deficiencies …

[图书][B] Insider threats in cyber security

CW Probst, J Hunker, M Bishop, D Gollmann - 2010 - books.google.com
Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of
insider threats together. This volume brings together a critical mass of well-established …