Detecting insider threats through language change.
نویسندگان
چکیده
منابع مشابه
Running Head: LANGUAGE OF INSIDERS Detecting Insider Threats Through Language Change
The act of conducting an insider attack carries with it cognitive and social challenges that may affect an offender’s day-to-day work behavior. We test this hypothesis by examining the language used in emails that were sent as part of a 6-hour workplace simulation. The simulation involved participants (N=54) examining databases and exchanging information as part of a four-stage organized crime ...
متن کاملInsider threats: Detecting and controlling malicious insiders
Malicious insiders are posing unique security challenges to organizations due to their knowledge, capabilities, and authorized access to information systems. Data theft and IT sabotage are two of the most recurring themes among crimes committed by malicious insiders. This paper aims to investigate the scale and scope of malicious insider risks and explore the impact of such threats on business ...
متن کاملDetecting Insider Threats by Monitoring System Call Activity
One approach to detecting insider misbehavior is to monitor system call activity and watch for danger signs or unusual behavior. We describe an experimental system designed to test this approach. We tested the system’s ability to detect common insider misbehavior by examining file system and process-related system calls. Our results show that this approach can detect many such activities. *
متن کاملA Framework for Detecting Insider Threats using Psychological Triggers
Malicious insiders are difficult to detect and prevent, because insiders such as employees have legitimate rights to access organization’s resources in order to carry out their responsibilities. To overcome this problem, we have developed a framework that detects suspicious insiders using a psychological trigger that impels malicious insiders to behave suspiciously. Also, we have proposed an ar...
متن کاملAspects of Insider Threats
The insider threat has received considerable attention, and is often cited as the most serious security problem. It is also considered the most difficult problem to deal with, because an “insider” has information and capabilities not known to external attackers. The difficulty in handling the insider threat is reasonable under those circumstances; if one cannot define a problem precisely, how c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Law and Human Behavior
سال: 2013
ISSN: 1573-661X,0147-7307
DOI: 10.1037/lhb0000032