Risk Assessment of Insider Threats Based on IHFACS-BN

نویسندگان

چکیده

Insider threats, as one of the pressing challenges that threaten an organization’s information assets, usually result in considerable losses to business. It is necessary explore key human factors enterprise security management should focus on preventing reduce probability insider threats effectively. This paper first puts forward improved Human Factors Analysis and Classification System (IHFACS) based actual management. Then, internal threat risk assessment model constructed using Bayesian network, expert evaluation, fuzzy set theory. Forty-three classic cases from China, United States, Israel during 2009–2021 are selected samples. reasoning sensitivity analysis recognizes top 10 most critical accident likely causal chain unsafe acts. The shows behavior was not assessing employees’ familiarity with company’s policies. In addition, improving organizational impact can effectively promote sustainable development enterprises.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Aspects of Insider Threats

The insider threat has received considerable attention, and is often cited as the most serious security problem. It is also considered the most difficult problem to deal with, because an “insider” has information and capabilities not known to external attackers. The difficulty in handling the insider threat is reasonable under those circumstances; if one cannot define a problem precisely, how c...

متن کامل

Software-based Decoy System for Insider Threats

Decoy technology and the use of deception are useful in securing critical computing systems by confounding and confusing adversaries with fake information. Deception leverages uncertainty forcing adversaries to expend considerable effort to differentiate realistic useful information from purposely planted false information. In this paper, we propose software-based decoy system that aims to dece...

متن کامل

Event-based Document Sensing for Insider Threats

In this report we describe a uniquely decentralized event-based system for online and offline tracking, analysis, and control of electronic document transactions in order to detect suspected insider misuse of those documents. Our system is focused on the problem of tracking and analyzing user’s actions with respect to documents. On the user side, the proposed system will support the placing of ...

متن کامل

System Dynamics Based Insider Threats Modeling

Insider threat has been recognized as one of the most dangerous security threats and become a much more complex issue. Insider threat is resulted from the legitimate users abusing their privileges and cause tremendous damage or losses. Not always being friends, insiders can be main threats to the organization. Currently, there is no equivalent prevention solution for insider threat to an intrut...

متن کامل

Countering Insider Threats

This article summarizes the objectives and structure of a seminar with the same title, held from July 20th to July 25th, 2008, at Schloss Dagstuhl, Germany. The seminar brought together researchers and policy-makers from all involved communities, to clarify what it is that identifies an insider threat, and to develop a common vision of how an insider can be categorized as well as an integrated ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sustainability

سال: 2022

ISSN: ['2071-1050']

DOI: https://doi.org/10.3390/su15010491