Insider Threat Security Reference Architecture

  title={Insider Threat Security Reference Architecture},
  author={Joji Montelibano and Andrew Moore},
  journal={2012 45th Hawaii International Conference on System Sciences},
The Insider Threat Security Reference Architecture, ITSRA, provides an enterprise wide solution to insider threat. The architecture consists of four security layers - Business, Information, Data, and Application. Organizations should deploy and enforce controls at each layer in order to address insider attacks. Each layer does not function in isolation or independently of other layers. Rather, the correlation of indicators and application of controls across all four layers forms the crux of… CONTINUE READING


Publications referenced by this paper.
Showing 1-9 of 9 references

Cisco SAFE Reference Guide: Cisco Validated Design

  • J. Chung, M. Pueblas, A. Nadimi, D. Hamilton, S. Farrington
  • Cisco Systems, Inc.,
  • 2010
Highly Influential
3 Excerpts

Common Sense Guide to Prevention and Detection of Insider Threats, 3 Edition

  • D. Cappelli, A. Moore, R. Trzeciak, T. Shimeall
  • Version 3.1,
  • 2009
Highly Influential
5 Excerpts

A Practical Guide to Federal Enterprise Architecture

  • Chief Information Officer Council
  • Federal Architecture Working Group (FAWG…
  • 2001
Highly Influential
4 Excerpts

Oracle Database Security Overview

  • Oracle Corporation
  • 2011

FEA Consolidated Reference Model Document Version 2.3

  • Executive Office of the President of the United States
  • October 2007.
  • 2007
3 Excerpts

Similar Papers

Loading similar papers…