Controlling insider threats with information security policies

نویسنده

  • Ali Alper Yayla
چکیده

Over the past decade, several studies, industry reports and surveys have revealed that insider threats constitute a significant role in information security. Following the literature, we categorized insider threats as intentional and unintentional. Computer misuse and fraud are considered as the two most common intentional threats, whereas, user errors and negligence are considered as the two most common unintentional threats. Building on the organizational behavior, psychology and criminology literatures, in this paper, we introduce different socio-behavioral control mechanisms to mitigate insider threats to information security. These mechanisms include employees’ integration and commitment to their job and organization, deterrence measures, management of work related stress, awareness of security issues, and motivation of employees. These socio-behavioral mechanisms are also accompanied by technical aspects such as user interface of security tools and technology-based controls. Lastly, the integrative and reinforcing role of security policies within the proposed framework is discussed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Risk of Risk Analysis-And its relation to the Economics of Insider Threats

Insider threats to organisational information security are widely viewed as an important concern, but little is understood as to the pattern of their occurrence. We outline an argument for explaining what originally surprised us: that many practitioners report that their organisations take basic steps to prevent insider attacks, but do not attempt to address more serious attacks. We suggest tha...

متن کامل

Insider threats: Detecting and controlling malicious insiders

Malicious insiders are posing unique security challenges to organizations due to their knowledge, capabilities, and authorized access to information systems. Data theft and IT sabotage are two of the most recurring themes among crimes committed by malicious insiders. This paper aims to investigate the scale and scope of malicious insider risks and explore the impact of such threats on business ...

متن کامل

A Risk Management Approach to the "Insider Threat"

Recent surveys indicate that the financial impact and operating losses due to insider intrusions are increasing. But these studies often disagree on what constitutes an “insider;” indeed, many define it only implicitly. In theory, appropriate selection of, and enforcement of, properly specified security policies should prevent legitimate users from abusing their access to computer systems, info...

متن کامل

Protecting information systems from insider threats - concepts and issues

Keynote abstract Past research on information security has focused on protecting valuable resources from attacks by outsiders. However, statistics show that a large amount of security and privacy breaches are due to insider attacks. Protection from insider threats is challenging because insiders may have access to many sensitive resources and high-privileged system accounts. Suitable approaches...

متن کامل

Managing Insider Security Threats (MIST 2012 Volume 1)

Insider threats are one of the serious hard problems of organizational security because it is often unclear whether or not an actor is an insider, or what we actually mean by “insider”. In addition, it is frequently almost impossible to verify if an authorized insider action (authorized at the level of an operational policy) would constitute an insider attack contravening the organizational sec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011