The Danger Within: Insider Threat Modeling Using Business Process Models

被引:0
|
作者
von der Assen, Jan [1 ]
Hochuli, Jasmin [1 ]
Grubl, Thomas [1 ]
Stiller, Burkhard [1 ]
机构
[1] Univ Zurich UZH, Dept Informat, Commun Syst Grp, CH-8050 Zurich, Switzerland
关键词
Threat Modeling; Insider Threats; Risk Management; Business Process Modeling; BPMN;
D O I
10.1109/CSR61664.2024.10679492
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threat modeling has been successfully applied to model technical threats within information systems. However, a lack of methods focusing on non-technical assets and their representation can be observed in theory and practice. Following the voices of industry practitioners, this paper explored how to model insider threats based on business process models. Hence, this study developed a novel insider threat knowledge base and a threat modeling application that leverages Business Process Modeling and Notation (BPMN). Finally, to understand how well the theoretic knowledge and its prototype translate into practice, the study conducted a real-world case study of an IT provider's business process and an experimental deployment for a real voting process. The results indicate that even without annotation, BPMN diagrams can be leveraged to automatically identify insider threats in an organization.
引用
收藏
页码:186 / 192
页数:7
相关论文
共 50 条
  • [21] Integrating Risk assessment and Threat modeling within SDLC process
    Maheshwari, V
    Prasanna, M.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 1, 2016, : 404 - 408
  • [22] Survival analysis for insider threat Detecting insider threat incidents using survival analysis techniques
    Alhajjar, Elie
    Bradley, Taylor
    COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2022, 28 (04) : 335 - 351
  • [23] The Process: Business Process Modeling Using BPMN
    Damrau, Jackie
    TECHNICAL COMMUNICATION, 2010, 57 (03) : 333 - 334
  • [24] Introduction to the special issue on insider threat modeling and simulation
    Moore, Andrew P.
    Kennedy, Kirk A.
    Dover, Thomas J.
    COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2016, 22 (03) : 261 - 272
  • [25] Insider Threat Modeling: An Adversarial Risk Analysis Approach
    Joshi, Chaitanya
    Aliaga, Jesus Rios
    Insua, David Rios
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 1131 - 1142
  • [26] Introduction to insider threat modeling, detection, and mitigation track
    Dodge Jr., Ronald C.
    Ferguson, Aaron J.
    Cappelli, Dawn M.
    Proceedings of the Annual Hawaii International Conference on System Sciences, 2012,
  • [27] Introduction to Insider Threat Modeling, Detection, and Mitigation Track
    Dodge, Ronald C., Jr.
    Ferguson, Aaron J.
    Cappelli, Dawn M.
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 1812 - 1812
  • [28] An agent-based approach to modeling insider threat
    Sokolowski, John A.
    Banks, Catherine M.
    Dover, Thomas J.
    COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2016, 22 (03) : 273 - 287
  • [29] Enterprise modeling within the framework of Business Process Reengineering
    Heng, KJ
    Khoong, CM
    Radjou, N
    Dhaliwal, JS
    Ramlochan, R
    INFORMATION AND PROCESS INTEGRATION IN ENTERPRISES: RETHINKING DOCUMENTS, 1998, 428 : 55 - 71
  • [30] Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds
    Alhebaishi, Nawaf
    Wang, Lingyu
    Jajodia, Sushil
    Singhal, Anoop
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018, 2018, 10980 : 3 - 20