David Chadwick , Ilsun You and Hang Bae Chang ( Eds . ) The 1 st International Workshop on Managing Insider Security Threats

نویسندگان

  • David Chadwick
  • Ilsun You
  • Hang Bae Chang
  • Shambhu Upadhyaya
  • Andrew P. Moore
  • Dawn M. Cappelli
  • Thomas C. Caron
  • Eric Shaw
  • Randall F. Trzeciak
  • Eugene H. Spafford
  • Howard Chivers
  • Philip Nobles
  • Siraj A. Shaikh
  • John A. Clark
چکیده

A study conducted by the Carnegie Mellon University Software Engineering Institute CERT Program analyzed hundreds of insider cyber crimes across U.S. critical infrastructure sectors. Follow-up work involved detailed group modeling and analysis of 35 cases of insider theft of intellectual property. In the context of this paper, insider theft of intellectual property for business advantage includes incidents in which the insider’s primary goal is stealing confidential or proprietary information from the organization with the intent to use it to take to a new job, to get a new job, or to start a business. It does not include cases of in which insiders sell an organization’s information. This paper describes general observations about, and a system dynamics model of, this class of insider crime based on our empirical data. This work generates empirically-based hypotheses for validation and a basis for identifying mititgative measures in future work.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Insider Behavior: An Analysis of Decision under Risk

There is considerable research being conducted on insider threats is directed to developing new technologies. At the same time, existing technology is not being fully utilized because of non-technological issues that pertain to economics and the human dimension. Issues related to how insiders actually behave are critical to ensuring that the best technologies are meeting their intended purpose....

متن کامل

Guest editorial: A brief overview of data leakage and insider threats

The challenges of preventing, detecting, and responding to data leakage propagated by authorized users, or insider threats, are among the most difficult facing security researchers and professionals today. Prior to the advent of computing, security experts identified potential insider threats by examining suspicious activities in a person’s physical behavior. While still relevant in the modern ...

متن کامل

Addressing insider threat using "where you are" as fourth factor authentication

Current physical and cybersecurity systems have been relying on traditional three factor authentication to mitigate the threats posed by insider attacks. Typically, systems use one or two of the following factors to authenticate end-users: what you know (e.g., password), what you have (e.g., RSA ID), or what you are (e.g., fingerprint). Systems based on these factors have the following limitati...

متن کامل

Managing Insider Security Threats (MIST 2012 Volume 1)

Insider threats are one of the serious hard problems of organizational security because it is often unclear whether or not an actor is an insider, or what we actually mean by “insider”. In addition, it is frequently almost impossible to verify if an authorized insider action (authorized at the level of an operational policy) would constitute an insider attack contravening the organizational sec...

متن کامل

Frontiers in Insider Threats and Data Leakage Prevention

Organizations continue to be plagued by information leaks caused by insiders with legitimate access to critical or proprietary information. Such unauthorized leaks may result in significant damage to competitiveness, reputation and finances, and organizations should consider proactive approaches to preventing, detecting, and responding to this threat. In this special issue, we have selected eig...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009