Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders

نویسندگان

  • Debin Liu
  • L. Jean Camp
  • XiaoFeng Wang
  • Lusha Wang
چکیده

The insider threat has been framed as protection of the network from insiders whose threat level may be unknown to the organization. In this paper, we propose a Budget-Based Access Control Model to mitigate the insider threat. We provide an order of magnitude price for every access right and assign each individual user a risk budget. The price for access is then personalized based on the observed historical behavior of the user. The risk budget represents the amount of risks an organization can tolerate from that employee. Each access right of a user may cost him certain risk points. The incentives come in the forms of punishments and rewards. The punishments are triggered by the risk budget exhaustion. On the other hand, those whose risk behavior is aligned with the organization’s risk preferences will be rewarded. The human-subject experimental results demonstrate our model’s positive influence on the users’ risk behavior. In addition, this work is distinguished from previous risk-based access controls by our modeling of users behaviors, prevention of risk point hoarding and provision of explicit pricing. All risk-based access inherently constrains behavior incentives.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Study on Factors Affecting Operational Electronic Banking Risks in Iran Banking Industry (Case Study: Kermanshah Melli Bank)

Nowadays, advances in information and communication technologies, has provided an opportunity for banks to provide their electronic services to their customers in remote areas. This technological innovation by E–banking systems has brought about many benefits to customers while it has been accompanied by a number of risks including the operational ones. This risks need to be identified and mana...

متن کامل

بررسی ورتبه بندی عوامل مؤثربرریسک عملیاتی بانکداری الکترونیکی در بانک مسکن (مطالعه موردی: شعب بانک مسکن در استان لرستان)

One of the essential tools for achieving the expansion of e-commerce is e-banking system. One of the major risks identified in the field of electronic banking, is operational risks. Accurate understanding of banks about the concept of operational risk to monitor and manage this specific category of risk effectively is vital. This study aimed to identify and rank the six factors, outsourcing, an...

متن کامل

Technology Risk Measurement and Reporting

risk without thinking about technology risk. Workflow-based applications, system-driven notifications and databases with web front ends are proliferating, and they make operational processes indistinguishable from the systems on which they run. A failure in the process of creating a loss event can almost inevitably be tracked down to a technology control that was not designed well or that faile...

متن کامل

Mitigating Inadvertent Insider Threats with Incentives

Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a malicious outsider to use the privileges of the inattentive insider to implement an insider attack. This risk is as old as conversion of a weak user password into root access, but the term inadvertent insider is recently...

متن کامل

ارزیابی کارایی بودجه در بخش دولتی سلامت برای مراقبت‌های سرپایی و بستری در مدل بودجه عملیاتی بر اساس کارکردها

Background and Objective: Expressing relationship between financial payments and performances’ results in health system could be explained by performance-based financing presentation. This study aimed to indicate differences in budget efficiencies amongst the Iranian provinces by comparative means, using performances data on public health sector in the provinces, and results of computing ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JoWUA

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2010