Frontiers in Insider Threats and Data Leakage Prevention

نویسندگان

  • Yoshiaki Hori
  • William R. Claycomb
  • Kangbin Yim
چکیده

Organizations continue to be plagued by information leaks caused by insiders with legitimate access to critical or proprietary information. Such unauthorized leaks may result in significant damage to competitiveness, reputation and finances, and organizations should consider proactive approaches to preventing, detecting, and responding to this threat. In this special issue, we have selected eight papers describing recent work on insider threat and data leakage prevention. These include four papers [1][2][3][4] derived from the third International Workshop on Managing Insider Security Threats (MIST 2011)1 in conjunction with the third IEEE International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS 2011). In the first paper, titled “From Insider Threats to Business Processes that are Secure-by-Design” [1], the author suggests that insider threat is a placeholder term indicating the transition from securing IT infrastructures to securing the socio-technical systems. While observing that the concept of an insider is not helpful in today’s dynamic heterogeneous organizations, he adopts “business processes that are secure-by-design (sustainable business processes)” as a new paradigm where those processes remain viable even when attacks are launched with insider knowledge. Finally, the author presents two research challenges for the sustainable business processes, modelling socio-technical systems and exploring the foundations of judgement-based risk analysis methods. The second paper, titled “Combining Baiting and User Search Profiling Techniques for Masquerade Detection” proposes an integrated masquerade detection to combine user behavior profiling with a baiting technique [5]. The proposed approach reduces false positives when compared to user behavior profiling alone. In addition, it is shown that this approach can harden a masquerade attack detector against mimicry attacks. In the third paper, titled “A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adversaries” [2], the authors propose an ordered sequential aggregate signature in certificateless setting. Further, they discuss its security against super adversaries who can obtain signature of a target signer but without providing a secret value for a challenger. The fourth paper titled “Security Analysis of Offline E-cash Systems with Malicious Insider” analyses security of offline anonymous electronic cash systems. This includes recent systems based on the

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Addressing Insider Threats and Information Leakage

Insider threats are one of the problems of organizational security that are most difficult to handle. It is often unclear whether or not an actor is an insider, or what we actually mean by “insider”. It also is often impossible to determine whether an insider action is permissible, or whether it constitutes an insider attack. From a technical standpoint, the biggest concern is the discriminatio...

متن کامل

Guest editorial: A brief overview of data leakage and insider threats

The challenges of preventing, detecting, and responding to data leakage propagated by authorized users, or insider threats, are among the most difficult facing security researchers and professionals today. Prior to the advent of computing, security experts identified potential insider threats by examining suspicious activities in a person’s physical behavior. While still relevant in the modern ...

متن کامل

Bypassing information leakage protection with trusted applications

Insider threats are an increasing concern for most modern organizations. Information leakage is one of the most important insider threats, particularly according to its potential financial impact. Data Leakage Protection (DLP) systems have been developed to tackle this issue and they constitute the main solution to protect information systems against leaks. They work by tracking sensitive infor...

متن کامل

System Dynamics Based Insider Threats Modeling

Insider threat has been recognized as one of the most dangerous security threats and become a much more complex issue. Insider threat is resulted from the legitimate users abusing their privileges and cause tremendous damage or losses. Not always being friends, insiders can be main threats to the organization. Currently, there is no equivalent prevention solution for insider threat to an intrut...

متن کامل

10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response

This article summarizes the objectives and structure of a seminar with the same title, held from August 22nd to 26th, 2010, at Schloss Dagstuhl, Germany. The seminar brought together researchers and policy-makers from quite diverse communities, to make progress towards an integrated framework for understanding insider threats and their interaction with organizations and policies. During the sem...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JoWUA

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2012