Insider threat assessment: Model, analysis and tool

7Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Insider threat is typically attributed to legitimate users who maliciously leverage their system privileges, and familiarity and proximity to their computational environment to compromise valuable information or inflict damage. According to the annual CSI/FBI surveys conducted since 1996, internal attacks and insider abuse form a significant portion of reported incidents. The strongest indication yet that insider threat is very real is given by the recent study [2] jointly conducted by CERT and the US Secret Service; the first of its kind, which provides an in-depth insight into the problem in a real-world setting. However, there is no known body of work which addresses this problem effectively. There are several challenges, beginning with understanding the threat. © 2010 Springer Science+Business Media, LLC.

Cite

CITATION STYLE

APA

Chinchani, R., Ha, D., Iyer, A., Ngo, H. Q., & Upadhyaya, S. (2010). Insider threat assessment: Model, analysis and tool. In Network Security (pp. 143–174). Springer US. https://doi.org/10.1007/978-0-387-73821-5_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free