The Insider Misuse Threat Survey: Investigating IT misuse from legitimate users

نویسنده

  • G. B. Magklaras
چکیده

The majority of computer security methods tend to focus upon the detection and prevention of security incidents of external origin. However, a number of surveys and media reports indicate the dangers of legitimate user misuse of IT resources, a separate category of computer security incidents with serious consequences for the integrity, privacy and availability of computer systems and networks. After the discussion of some basic terminology, accompanied by relevant case studies, the paper explores the problem of insider IT misuse by analyzing the results of a survey that specifically examines the issue. The results revealed that insider misuse is a significant problem – both in terms of the volume of incidents and their consequent impacts upon the organizations concerned. The findings also suggested characteristics that may help to profile insider IT misuse, and hence develop more efficient tools for the mitigation of insider threat.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards an insider threat prediction specification language

Purpose This concept paper presents the process of constructing a language tailored to describing insider threat incidents, for the purposes of mitigating threats originating from legitimate users in an IT infrastructure. Various information security surveys indicate that misuse by legitimate (insider) users has serious implications for the health of IT environments. A brief discussion of surve...

متن کامل

A preliminary model of end user sophistication for insider threat prediction in IT systems

The dangers that originate from acts of IT system misuse by legitimate users constitute a separate category of threats with well documented consequences for the integrity, privacy and availability of computer systems and networks. Amongst the various properties of malicious legitimate users one of the most notable ones is the level of his/her sophistication. Various studies indicate that user s...

متن کامل

An insider misuse threat detection and prediction language

An Insider Misuse Threat Detection and Prediction Language Georgios Vasilios Magklaras BSc (Hons) MPhil Numerous studies indicate that amongst the various types of security threats, the problem of insider misuse of IT systems can have serious consequences for the health of computing infrastructures. Although incidents of external origin are also dangerous, the insider IT misuse problem is diffi...

متن کامل

Insider Threat Prediction Tool: Evaluating the probability of IT misuse

Despite the well documented and emerging insider threat to information systems, there is currently no substantial effort devoted to addressing the problem of internal IT misuse. In fact, the great majority of misuse countermeasures address forms of abuse originating from external factors (i.e. the perceived threat from unauthorized users). This paper suggests a new and innovative approach of de...

متن کامل

Reducing the Risk of Insider Misuse by Revising Identity Management and User Account Data

To avoid insider computer misuse, identity and authorization data referring to the legitimate users of the systems must be properly organized and constantly and systematically analyzed and evaluated. In order to support this, a methodology for structured Identity Management has been developed. This methodology includes gathering of identity data spread among different applications, systematic c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008