Defending against insider threats and internal data leakage

نویسندگان

  • Ilsun You
  • Gabriele Lenzini
  • Marek R. Ogiela
  • Elisa Bertino
چکیده

In the last decade, computer science researchers have been working hard to prevent attacks against the security of information systems. Different adversary models have incarnated the malicious entities against which researchers have defined security properties, identified security vulnerabilities, and engineered security defenses. These adversaries were usually intruders, that is, outsiders trying to break into a system’s defenses. However, security reports clearly reveal that an increasing number of threats come presently from insiders. Insiders are legally authorized individuals who have, or used to have, access to corporate resources. Their illegal activities are not easily distinguishable from the uncommon but legal activities executed by honest corporate users. To detect insiders’ illegal activities is therefore hard, to recover after a security breach by an insider is expensive, and even though insider attacks occur less frequently than outsider, their consequences are far more severe. Insiders can cause significant damages to enterprises, companies, and countries. They can threaten an enterprise’s reputation, weaken national and international competitiveness, and compromise a country’s overall business. Therefore, it is necessary to develop countermeasures that are able to evaluate and to contain the risks of unauthorized accesses coming from insiders. Those countermeasures—physical, managerial, and technical— should construct an integral security management system that is able to protect, internally as well as externally, a company’s major information assets. This special issue collects scientific studies and works on security technologies and management systems designed to protect an organization’s information systems from corporate intrusions. It aims to be the showcase for researchers who look at state-of-the-art solutions about preventing leakage of organizations’ information caused by insiders or by insiders’ actions. This special issue consists of one invited contribution and seven carefully selected scientific papers. The invited paper, Reverse-safe Authentication Protocol for Secure USB Memories, by K. Lee, K. Yim, and E. Spafford, opens the special issue. This paper studies the security of USB memories. These small but capacious storage devices are extremely handy. People use them to carry personal and professional information, including pieces of very sensitive and valuable data. Unfortunately, USB memory devices are easy to steal, and once they are lost or stolen, their valuable content can be hacked.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Defending Insider Threat

Network threat confronting organizations comes from not only outsider threat, but also insider threat. Nowadays, insider threat is widely recognized as an important issue of security management. However, tools and controls on how to fight against it are still in the research phase. Security architecture for defending insider threat is presented, which is composed of four parts: monitoring platf...

متن کامل

Addressing Insider Threats and Information Leakage

Insider threats are one of the problems of organizational security that are most difficult to handle. It is often unclear whether or not an actor is an insider, or what we actually mean by “insider”. It also is often impossible to determine whether an insider action is permissible, or whether it constitutes an insider attack. From a technical standpoint, the biggest concern is the discriminatio...

متن کامل

Frontiers in Insider Threats and Data Leakage Prevention

Organizations continue to be plagued by information leaks caused by insiders with legitimate access to critical or proprietary information. Such unauthorized leaks may result in significant damage to competitiveness, reputation and finances, and organizations should consider proactive approaches to preventing, detecting, and responding to this threat. In this special issue, we have selected eig...

متن کامل

The Insider Threat in Cloud Computing

Cloud computing is an emerging technology paradigm, enabling and facilitating the dynamic and versatile provision of computational resources and services. Even though the advantages offered by cloud computing are several, there still exist second thoughts on the security and privacy of the cloud services. Use of cloud services affects the security posture of organizations and critical infrastru...

متن کامل

Bypassing information leakage protection with trusted applications

Insider threats are an increasing concern for most modern organizations. Information leakage is one of the most important insider threats, particularly according to its potential financial impact. Data Leakage Protection (DLP) systems have been developed to tackle this issue and they constitute the main solution to protect information systems against leaks. They work by tracking sensitive infor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Security and Communication Networks

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2012