2010
DOI: 10.1007/978-1-4419-7133-3_6
|View full text |Cite
|
Sign up to set email alerts
|

A Risk Management Approach to the “Insider Threat”

Abstract: Recent surveys indicate that the financial impact and operating losses due to insider intrusions are increasing. But these studies often disagree on what constitutes an "insider;" indeed, many define it only implicitly. In theory, appropriate selection of, and enforcement of, properly specified security policies should prevent legitimate users from abusing their access to computer systems, information, and other resources. However, even if policies could be expressed precisely, the natural mapping between the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 23 publications
(14 citation statements)
references
References 24 publications
0
14
0
Order By: Relevance
“…Bishop et al [13], [14] propose a graduated notion of insiderness. They introduce a hierarchy of policy abstractions, and argue that the discrepancies between the different layers of abstraction are useful for identifying insider threats.…”
Section: A Motivating Studiesmentioning
confidence: 99%
“…Bishop et al [13], [14] propose a graduated notion of insiderness. They introduce a hierarchy of policy abstractions, and argue that the discrepancies between the different layers of abstraction are useful for identifying insider threats.…”
Section: A Motivating Studiesmentioning
confidence: 99%
“…115-137. 17 Bishop et al, 2010. 18 Imperva, Insiders: The Threat Is Already Within, Hacker Intelligence Initiative Report, Redwood Shores, Calif., 2016.…”
Section: Does the Us Government Consider Security Negligence A Formmentioning
confidence: 99%
“…Park and Giordano [25] reverse the Hu et al approach, analyzing a user's behavior and checking that it is as expected. Several researchers [26]- [28] incorporate risk assessment into an extended access control framework, adapting user privileges based on role, attributes, and level of trust, which drops when a user's behavior becomes suspicions. Other work extends the RBAC model by focusing on generalized attributes of people and data, and placing the insider threat in the context of modeling policies using layers of abstraction [29], [30].…”
Section: Related Workmentioning
confidence: 99%