Back to Search
Start Over
Insider Threat Assessment: a Model-Based Methodology
- Publication Year :
- 2014
-
Abstract
- Security is a major challenge for today's companies, especially ICT ones which manage large scale cyber-critical systems. Amongst the multitude of attacks and threats to which a system is potentially exposed, there are insider attackers i.e., users with legitimate access which abuse or misuse of their power, thus leading to unexpected security violation (e.g., acquire and disseminate sensitive information). These attacks are very difficult to detect and mitigate due to the nature of the attackers, which often are company's employees motivated by socio-economical reasons, and to the fact that attackers operate within their granted restrictions. It is a consequence that insider attackers constitute an actual threat for ICT organizations. In this paper we present our methodology, together with the application of existing supporting libraries and tools from the state-of-the-art, for insider threats assessment and mitigation. The ultimate objective is to define the motivations and the target of an insider, investigate the likeliness and severity of potential violations, and finally identify appropriate countermeasures. The methodology also includes a maintenance phase during which the assessment can be updated to reflect system changes. As case study, we apply our methodology to the crisis management system Secure!, which includes different kinds of users and consequently is potentially exposed to a large set of insider threats.
- Subjects :
- Computer science
business.industry
Internet privacy
Insider threat
Crisis management
Computer security
computer.software_genre
Insider
Information sensitivity
security
insider threats
risk assessment
attack path
Information and Communications Technology
Scale (social sciences)
General Earth and Planetary Sciences
Dependability
business
Dissemination
computer
General Environmental Science
Subjects
Details
- Language :
- English
- Database :
- OpenAIRE
- Accession number :
- edsair.doi.dedup.....2deab78302080fc704d99a5932378bab