Mitigating malicious insider cyber threat
نویسندگان
چکیده
This paper examines malicious insider threat and explains the key differences from other types of insider threat and from external threat actors. A phase based “kill-chain” malicious insider threat model is developed and proposed to help inform selection of mitigation countermeasures which are complementary or incremental to a typically implemented traditional ISO 17799/27002 information security management system (ISMS). An analysis of best practice guidance is used to select appropriate countermeasures and strategic considerations for implementing an effective insider threat mitigation programme. Mitigating malicious insider cyber threat Jason Anthony Smith 2014
منابع مشابه
The Cyber Enemy Within ... Countering the Threat from Malicious Insiders
One of the most critical problems facing the information security community is the threat of a malicious insider abusing his computer privileges to modify, remove, or prevent access to an organization’s data. An insider is considered trusted (at least implicitly) by his organization because he is granted access to its computing environment. Whether or not that insider is in fact trustworthy is ...
متن کاملUnintentional Insider Threats: A Review of Phishing and Malware Incidents by Economic Sector
The research documented in this paper seeks to advance the understanding of the unintentional insider threat (UIT) that results from phishing and other social engineering cases, specifically those involving malicious software (malware). The research team collected and analyzed publicly reported phishing cases and performed an initial analysis of the industry sectors impacted by this type of inc...
متن کاملUnintentional Insider Threats: A Review of Phishing and Malware Incidents by Economic Sector
The research documented in this paper seeks to advance the understanding of the unintentional insider threat (UIT) that results from phishing and other social engineering cases, specifically those involving malicious software (malware). The research team collected and analyzed publicly reported phishing cases and performed an initial analysis of the industry sectors impacted by this type of inc...
متن کاملDealing with the Malicious Insider
This paper looks at a number of issues relating to the malicious insider and the nature of motivation, loyalty and the type of attacks that occur. The paper also examines the changing environmental, social, cultural and business issues that have resulted in an increased exposure to the insider threat. The paper then discusses a range of measures that can be taken to reduce both the likelihood o...
متن کاملTowards a Conceptual Model and Reasoning Structure for Insider Threat Detection
The insider threat faced by corporations and governments today is a real and significant problem, and one that has become increasingly difficult to combat as the years have progressed. From a technology standpoint, traditional protective measures such as intrusion detection systems are largely inadequate given the nature of the ‘insider’ and their legitimate access to prized organisational data...
متن کامل