Cybersecurity: Revisiting the definition of insider threat

被引:0
|
作者
Beebe, Nicole Lang [1 ]
Chang, Frederick R. [2 ]
机构
[1] Department of Information Systems & Cyber Security, Cyber Center for Security & Analytics, University of Texas at San Antonio, United States
[2] Department of Computer Science, Darwin Institute for Cyber Security at Southern Methodist University, United States
来源
Bridge | 1600年 / 49卷 / 03期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
46
引用
收藏
页码:12 / 19
相关论文
共 50 条
  • [31] Cybersecurity Confronting the Threat of Shadow IT
    Prince, Brian
    FORBES, 2014, 194 (05): : 136 - +
  • [32] TOWARD A DEFINITION OF INSIDER TRADING
    ANABTAWI, I
    STANFORD LAW REVIEW, 1989, 41 (02) : 377 - 399
  • [33] Electromagnetic Warfare and the Cybersecurity Threat
    Pinou, Damianos
    Chy, Rien
    Hayajneh, Thaier
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 669 - 674
  • [34] Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat
    Legg, Philip A.
    Buckley, Oliver
    Goldsmith, Michael
    Creese, Sadie
    2015 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2015,
  • [35] Insider Threat Program Best Practices
    Guido, Mark D.
    Brooks, Marc W.
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 1831 - 1839
  • [36] Cybercrime Countermeasure of Insider Threat Investigation
    Kao, Da-Yu
    2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 413 - 418
  • [37] Aspectising honeytokens to contain the insider threat
    Padayachee, Keshnee
    IET INFORMATION SECURITY, 2015, 9 (04) : 240 - 247
  • [38] Weak models for insider threat detection
    Thompson, P
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE(C31) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE III, PTS 1 AND 2, 2004, 5403 : 40 - 48
  • [39] The insider threat to nuclear safety and security
    Healey, Andrew N.
    SECURITY JOURNAL, 2016, 29 (01) : 23 - 38
  • [40] Modeling the emergence of insider threat vulnerabilities
    Martinez-Moyano, Ignacio J.
    Rich, Eliot H.
    Conrad, Stephen H.
    Andersen, David F.
    PROCEEDINGS OF THE 2006 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2006, : 562 - +