24th Pan-Hellenic Conference on Informatics 2020
DOI: 10.1145/3437120.3437336
|View full text |Cite
|
Sign up to set email alerts
|

The Insider Threat: Reasons, Effects and Mitigation Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Insider Threat: Tsiostas et al [2] define an insider threat as someone who has an organization's credentials and permissions and acts in a way that harms the organization.…”
Section: Definitions Dendrogrammentioning
confidence: 99%
See 1 more Smart Citation
“…Insider Threat: Tsiostas et al [2] define an insider threat as someone who has an organization's credentials and permissions and acts in a way that harms the organization.…”
Section: Definitions Dendrogrammentioning
confidence: 99%
“…According to Morgan [1], the expected 2023 annual global cost of cybercrime is approximately $11 trillion. A particular concern for cybersecurity is the "insider threat," defined by Tsiostas et al [2] as an individual who has authorized access to organizational assets and information and who acts either maliciously or accidentally in a manner that negatively affects the organization. According to the Ponemon Institute [3], the average cost to resolve all insider threat activities was $15,380,000 per company.…”
Section: Introductionmentioning
confidence: 99%
“…Incorrect or overly permissive access decisions leave companies vulnerable to insider threats. A malicious or careless insider can harm an organization severely, with consequences spanning from unintentional incidents to sabotage, fraud or espionage (Tsiostas et al, 2020). In contrast, overly restrictive access decisions prevent employees from doing their work, leading to costly interruptions in operations and task backlogs.…”
Section: Introductionmentioning
confidence: 99%
“…In contrast, overly restrictive access decisions prevent employees from doing their work, leading to costly interruptions in operations and task backlogs. Recent studies estimate that the average annual cost of insider threats for companies reach $11.45 million in 2020 (Gilbert, 2021;Tsiostas et al, 2020). The implementation of effective Identity and Access Management (IAM) measures, which follow the principle of least privilege (Horne, 2011), is hence mandated by major regulatory frameworks and IT security standards 1 .…”
Section: Introductionmentioning
confidence: 99%
“…This feature also introduces the humanoids to passive attacks like reconnaissance and non-invasive attacks like spoofing, jamming, blinding, and so on [49]. Other potential sources of attacks on social humanoids include the human element [50] and the AI system [51]. In this context, a current challenge is inadequate knowledge of the threat actors, attack surface, and threat landscape for social robots in public spaces.…”
Section: Introductionmentioning
confidence: 99%