A multi-tiered framework for insider threat prevention
RA Alsowail, T Al-Shehari - Electronics, 2021 - mdpi.com
As technologies are rapidly evolving and becoming a crucial part of our lives, security and
privacy issues have been increasing significantly. Public and private organizations have …
privacy issues have been increasing significantly. Public and private organizations have …
Impact and key challenges of insider threats on organizations and critical businesses
The insider threat has consistently been identified as a key threat to organizations and
governments. Understanding the nature of insider threats and the related threat landscape …
governments. Understanding the nature of insider threats and the related threat landscape …
Inside the insider
GL Sanders, S Upadhyaya… - IEEE Engineering …, 2019 - ieeexplore.ieee.org
We present an overview of two major research projects on the role of monetary incentives
and psychological traits in attracting individuals to hacking behavior. In the first study …
and psychological traits in attracting individuals to hacking behavior. In the first study …
[HTML][HTML] VISTA: An inclusive insider threat taxonomy, with mitigation strategies
Insiders have the potential to do a great deal of damage, given their legitimate access to
organisational assets and the trust they enjoy. Organisations can only mitigate insider …
organisational assets and the trust they enjoy. Organisations can only mitigate insider …
[图书][B] Insider threat: Prevention, detection, mitigation, and deterrence
MG Gelles - 2016 - books.google.com
Insider Threat: Detection, Mitigation, Deterrence and Prevention presents a set of solutions
to address the increase in cases of insider threat. This includes espionage, embezzlement …
to address the increase in cases of insider threat. This includes espionage, embezzlement …
Controlling insider threats with information security policies
A Yayla - 2011 - aisel.aisnet.org
Over the past decade, several studies, industry reports and surveys have revealed that
insider threats constitute a significant role in information security. Following the literature, we …
insider threats constitute a significant role in information security. Following the literature, we …
Addressing the insider threat
SL Pfleeger, SJ Stolfo - IEEE Security & Privacy, 2009 - ieeexplore.ieee.org
In their guest editors' introduction to the special issue on Insider Threat, Shari Lawrence
Pfleeger and Salvatore Stolfo describe a taxonomy of insiders and their unwelcome actions …
Pfleeger and Salvatore Stolfo describe a taxonomy of insiders and their unwelcome actions …
Positioning your organization to respond to insider threats
FL Greitzer, J Purl, YM Leong… - IEEE Engineering …, 2019 - ieeexplore.ieee.org
Insider threats refer to actions by trusted individuals that directly or indirectly bring harm to
the organization or expose the organization to external risks. Insider threat detection …
the organization or expose the organization to external risks. Insider threat detection …
Introduction to the special issue on insider threat modeling and simulation
AP Moore, KA Kennedy, TJ Dover - Computational and Mathematical …, 2016 - Springer
Despite the high impact of insider attacks, findings show that many organizations have no
insider threat program in place, and most programs that do exist have serious deficiencies …
insider threat program in place, and most programs that do exist have serious deficiencies …
[图书][B] Insider threats in cyber security
Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of
insider threats together. This volume brings together a critical mass of well-established …
insider threats together. This volume brings together a critical mass of well-established …