Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research: Developing Strategies to Meet T 2008
DOI: 10.1145/1413140.1413158
|View full text |Cite
|
Sign up to set email alerts
|

Defining the insider threat

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
47
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 85 publications
(47 citation statements)
references
References 1 publication
0
47
0
Order By: Relevance
“…Bishop and Gates' article "Defining the Insider Threat" define an insider [21]; both of these models are classified as "process". Niekerk and Solms present a conceptual model to facilitate conceptual thinking and argumentation in the culture of information security [22].…”
Section: Related Workmentioning
confidence: 99%
“…Bishop and Gates' article "Defining the Insider Threat" define an insider [21]; both of these models are classified as "process". Niekerk and Solms present a conceptual model to facilitate conceptual thinking and argumentation in the culture of information security [22].…”
Section: Related Workmentioning
confidence: 99%
“…Different definitions of insider threat have been introduced in [1] and [5]. Researchers in [3] have discussed this issue at an application level such as relational databases.…”
Section: Related Workmentioning
confidence: 99%
“…Actually, weights on edges in the graph are the amount of information the insider gets if he/she has exact knowledge about source data items. Thus, in the example, the amount of information the insider gets about a 2 is not 19% since the insider does not have exact knowledge about a 5 .…”
Section: An Example Scenariomentioning
confidence: 99%
“…In some cases, the degree of "insiderness" associated with an stakeholder needs to be identified in order to effectively assess risks as the traditional binary definition that requires a clear insider/outsider boundary is longer an appropriate model [1]. Figure 1 provides an example of a generic cloud computing scenario which demonstrates the complexity of the evolving security perimeter.…”
Section: Introductionmentioning
confidence: 99%