Insider threat is typically attributed to legitimate users who maliciously leverage their system privileges, and familiarity and proximity to their computational environment to compromise valuable information or inflict damage. According to the annual CSI/FBI surveys conducted since 1996, internal attacks and insider abuse form a significant portion of reported incidents. The strongest indication yet that insider threat is very real is given by the recent study [2] jointly conducted by CERT and the US Secret Service; the first of its kind, which provides an in-depth insight into the problem in a real-world setting. However, there is no known body of work which addresses this problem effectively. There are several challenges, beginning with understanding the threat. © 2010 Springer Science+Business Media, LLC.
CITATION STYLE
Chinchani, R., Ha, D., Iyer, A., Ngo, H. Q., & Upadhyaya, S. (2010). Insider threat assessment: Model, analysis and tool. In Network Security (pp. 143–174). Springer US. https://doi.org/10.1007/978-0-387-73821-5_7
Mendeley helps you to discover research relevant for your work.