Reachability-based Impact as a Measure for Insiderness
نویسندگان
چکیده
Insider threats pose a difficult problem for many organisations. While organisations in principle would like to judge the risk posed by a specific insider threat, this is in general not possible. This limitation is caused partly by the lack of models for human behaviour, partly by restrictions on how much and what may be monitored, and by our inability to identify relevant features in large amounts of logged data. To overcome this, the notion of insiderness has been proposed, which measures the degree of access an actor has to a certain resource. We extend this notion with the concept of impact of an insider, and present different realisations of impact. The suggested approach results in readily usable techniques that allow to get a quick overview of potential insider threats based on locations and assets reachable by employees. We present several variations ranging from pure reachability to potential damage to assets causable by an insider.
منابع مشابه
Internet Control Plane Event Identification using Model Based Change Point Detection Techniques
In the raise of many global organizations deploying their data centers and content services in India, the prefix reachability performance study from global destinations garners our attention. The events such as link/node failures and DDoS attacks occurring in the Internet topology have impact on Autonomous System (AS) paths announced in the control plane and reachability of prefixes from spatia...
متن کاملResearching Coethnic Migrants: Privileges and Puzzles of "Insiderness"
This article reflects on fieldwork experiences with coethnic migrants in London to challenge understandings of insiderness centred in shared ethnicity, as well as the usefulness of the insider-outsider divide in migration research more generally. Drawing on examples from a study of migrants' social relations, it shows how gender, migrant status, and occupational position sometimes shape researc...
متن کاملReachability checking in complex and concurrent software systems using intelligent search methods
Software system verification is an efficient technique for ensuring the correctness of a software product, especially in safety-critical systems in which a small bug may have disastrous consequences. The goal of software verification is to ensure that the product fulfills the requirements. Studies show that the cost of finding and fixing errors in design time is less than finding and fixing the...
متن کامل“Caring for insiderness”: Phenomenologically informed insights that can guide practice
Understanding the "insider" perspective has been a pivotal strength of qualitative research. Further than this, within the more applied fields in which the human activity of "caring" takes place, such understanding of "what it is like" for people from within their lifeworlds has also been acknowledged as the foundational starting point in order for "care" to be caring. But we believe that more ...
متن کاملA Box-Based Distance between Regions for Guiding the Reachability Analysis of SpaceEx
A recent technique used in falsification methods for hybrid systems relies on distance-based heuristics for guiding the search towards a goal state. The question is whether the technique can be carried over to reachability analyses that use regions as their basic data structure. In this paper, we introduce a box-based distance measure between regions. We present an algorithm that, given two reg...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JoWUA
دوره 4 شماره
صفحات -
تاریخ انتشار 2013