The insider threat minimization and mitigation framework

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

Countering the insider threat is a difficult and daunting task. Organizations concerned with the problem usually train their employees on security-related matters, rules of behavior policies, and the consequences of committing criminal activities. More technically-oriented solutions include enhanced credentialing and access control, and the use of monitoring tools that provide insight into the health and status of systems. This paper addresses the deficiency of widely-used monitoring tools and strategies. It proposes a solution that equips a system with innate self-defense mechanisms that relieve the system from having to rely on human intervention. The paper introduces the Insider Threat Minimization and Mitigation Framework. The framework equips systems with self-defense mechanisms such that a system can instantaneously respond to potential threats and defend itself against users who have unfettered access to it. The framework employs the autonomous demotion of power users' access privileges based on analysis and evaluation of the user's risk level. The paper presents the details of the proposed framework and simulates its effectiveness within a data center environment of mission-critical systems.

Cite

CITATION STYLE

APA

Jabbour, G., & Jabbour, J. J. (2021). The insider threat minimization and mitigation framework. In 14th IADIS International Conference Information Systems 2021, IS 2021 (pp. 69–77). IADIS. https://doi.org/10.33965/is2021_202103l009

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free