2018 IEEE Security and Privacy Workshops (SPW) 2018
DOI: 10.1109/spw.2018.00040
|View full text |Cite
|
Sign up to set email alerts
|

Navigating the Insider Threat Tool Landscape: Low Cost Technical Solutions to Jump Start an Insider Threat Program

Abstract: This paper explores low cost technical solutions that can help organizations prevent, detect, and respond to insider incidents. Features and functionality associated with insider risk mitigation are presented. A taxonomy for high-level categories of insider threat tools is presented. A discussion of the relationship between the types of tools points out the nuances of insider threat control deployment, and considerations for selecting, implementing, and operating insider threat tools are provided.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 4 publications
0
7
0
Order By: Relevance
“…Insider threats are mostly a deliberate, calculated and malicious breach of the system and its security, often carried out by persons with legitimate access who are usually authorized and trusted within the organization's basic and perimeter security. 25,29,30,[73][74][75][76] The impact of this could lead to significant harm or loss to the confidentiality, integrity, or availability (CIA) of the affected organizational system and its data. 26,75 Consequently, no IoT system has guaranteed security from attacks by insiders.…”
Section: Modeling Iot Insider Threatsmentioning
confidence: 99%
“…Insider threats are mostly a deliberate, calculated and malicious breach of the system and its security, often carried out by persons with legitimate access who are usually authorized and trusted within the organization's basic and perimeter security. 25,29,30,[73][74][75][76] The impact of this could lead to significant harm or loss to the confidentiality, integrity, or availability (CIA) of the affected organizational system and its data. 26,75 Consequently, no IoT system has guaranteed security from attacks by insiders.…”
Section: Modeling Iot Insider Threatsmentioning
confidence: 99%
“…The insider threat has always been one of the most serious challenges to cybersecurity [ 5 , 6 ]. The attacker has legal access to the internal network system [ 7 ]. Furthermore, they possibly have a good understanding of the system’s security policies and means and thus can easily bypass the system’s security facilities [ 8 ].…”
Section: Background and Related Workmentioning
confidence: 99%
“…These scenario-based detectors are then used in clustering algorithms to sort emails into classes (Young et al, 2014). According to various authors, there are three main types of insider threats, namely, insider it sabotage, insider intellectual property theft and insider fraud (Spooner et al, 2018;Claycomb et al, 2013;Cappelli et al, 2012;Munshi et al, 2012). Spooner et al (2018) used observable behaviours of the main insider threat types and studied various approaches to detect threats in organizations.…”
Section: Background and Related Workmentioning
confidence: 99%
“…According to various authors, there are three main types of insider threats, namely, insider it sabotage, insider intellectual property theft and insider fraud (Spooner et al, 2018;Claycomb et al, 2013;Cappelli et al, 2012;Munshi et al, 2012). Spooner et al (2018) used observable behaviours of the main insider threat types and studied various approaches to detect threats in organizations. For example, user activity monitoring was found as a means to examinine emails and find evidence related to employee disgruntlement (Spooner et al, 2018).…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation