A Risk Management Approach to the "Insider Threat"

@inproceedings{Bishop2010ARM,
  title={A Risk Management Approach to the "Insider Threat"},
  author={M. Bishop and S. Engle and D. Frincke and C. Gates and F. Greitzer and S. Peisert and Sean Whalen},
  booktitle={Insider Threats in Cyber Security},
  year={2010}
}
Recent surveys indicate that the financial impact and operating losses due to insider intrusions are increasing. But these studies often disagree on what constitutes an “insider;” indeed, manydefine it only implicitly. In theory, appropriate selection of, and enforcement of, properly specified security policies should prevent legitimate users from abusing their access to computer systems, information, and other resources. However, even if policies could be expressed precisely, the natural… Expand
A Framework for Detecting Insider Threats using Psychological Triggers
  • Takayuki Sasaki
  • Business, Computer Science
  • J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
  • 2012
Towards a Realistic Risk Assessment Methodology for Insider Threats of Information Misuse
Insiders and Insider Threats - An Overview of Definitions and Mitigation Techniques
  • Jeffrey Hunker, C. Probst
  • Computer Science, Sociology
  • J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
  • 2011
Insider Threat Identification by Process Analysis
Insider threat mitigation framework
Insider Detection by Process Analysis
Complexity of Insider Attacks to Databases
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 51 REFERENCES
A framework for understanding and predicting insider attacks
Case Studies of an Insider Framework
The Chinese Wall security policy
E-Voting and Forensics: Prying Open the Black Box
A model of forensic analysis using goal-oriented logging
...
1
2
3
4
5
...