2012 45th Hawaii International Conference on System Sciences 2012
DOI: 10.1109/hicss.2012.327
|View full text |Cite
|
Sign up to set email alerts
|

Insider Threat Security Reference Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…One of the first authors to identify the need to combine these sources need is Schultz, who notes, "many different potential indicators of internal attacks exist," and suggests several indicators including technical and nontechnical components. Others have championed the same cause [14]- [16], but few have implemented successful realworld socio-technical monitoring systems, and this remains an open research challenge.…”
Section: A Socio-technical Approaches and Predictive Modelsmentioning
confidence: 98%
“…One of the first authors to identify the need to combine these sources need is Schultz, who notes, "many different potential indicators of internal attacks exist," and suggests several indicators including technical and nontechnical components. Others have championed the same cause [14]- [16], but few have implemented successful realworld socio-technical monitoring systems, and this remains an open research challenge.…”
Section: A Socio-technical Approaches and Predictive Modelsmentioning
confidence: 98%
“…With so many controls available, the task for the security manager to select the best security package to implement is quite difficult. Insider security strategies, or approaches, have been developed to guide the security manager's focus in order to achieve a stronger security system as a whole [6,9,[33][34][35][36][37][38][39][40][41]. Some state where along the threat pathway the opportunity to stop the perpetrator is greatest.…”
Section: Introductionmentioning
confidence: 99%
“…This would enable them to prioritise their investments and customise their security arrangements to meet the organisation's needs. Security solutions should be guided by a conceptual framework that takes into account the various insider types, as well as how security controls interact to reduce insider risk along the various threat pathways [10,26,37,44,45].…”
Section: Introductionmentioning
confidence: 99%
“…This would enable them to prioritise their investments and to customise their security arrangements to meet the organisation's needs. Security arrangements should be guided by a conceptual framework that takes account of the insider category, as well as the way that security controls interact to reduce insider risk along the threat pathway [15], [22], [31], [38]. Low incidence rates combined with high potential impact suggest that risk management techniques are a relevant, and arguably the most appropriate, framework for insider management [15], [22], [31], [39].…”
Section: Introductionmentioning
confidence: 99%