The Danger Within: Insider Threat Modeling Using Business Process Models

被引:0
|
作者
von der Assen, Jan [1 ]
Hochuli, Jasmin [1 ]
Grubl, Thomas [1 ]
Stiller, Burkhard [1 ]
机构
[1] Univ Zurich UZH, Dept Informat, Commun Syst Grp, CH-8050 Zurich, Switzerland
关键词
Threat Modeling; Insider Threats; Risk Management; Business Process Modeling; BPMN;
D O I
10.1109/CSR61664.2024.10679492
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threat modeling has been successfully applied to model technical threats within information systems. However, a lack of methods focusing on non-technical assets and their representation can be observed in theory and practice. Following the voices of industry practitioners, this paper explored how to model insider threats based on business process models. Hence, this study developed a novel insider threat knowledge base and a threat modeling application that leverages Business Process Modeling and Notation (BPMN). Finally, to understand how well the theoretic knowledge and its prototype translate into practice, the study conducted a real-world case study of an IT provider's business process and an experimental deployment for a real voting process. The results indicate that even without annotation, BPMN diagrams can be leveraged to automatically identify insider threats in an organization.
引用
收藏
页码:186 / 192
页数:7
相关论文
共 50 条
  • [31] An agent-based approach to modeling insider threat
    John A. Sokolowski
    Catherine M. Banks
    Thomas J. Dover
    Computational and Mathematical Organization Theory, 2016, 22 : 273 - 287
  • [32] Introduction to the special issue on insider threat modeling and simulation
    Andrew P. Moore
    Kirk A. Kennedy
    Thomas J. Dover
    Computational and Mathematical Organization Theory, 2016, 22 : 261 - 272
  • [33] Enemies within: Redefining the insider threat in organizational security policy
    Wall, David S.
    SECURITY JOURNAL, 2013, 26 (02) : 107 - 124
  • [34] Enemies within: Redefining the insider threat in organizational security policy
    David S Wall
    Security Journal, 2013, 26 : 107 - 124
  • [35] Modeling Expert Judgments of Insider Threat Using Ontology Structure: Effects of Individual Indicator Threat Value and Class Membership
    Greitzer, Frank L.
    Purl, Justin
    Becker, D. E.
    Sticha, Paul J.
    Leong, Yung Mei
    PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 3202 - 3211
  • [36] BPML : a process modeling language for dynamic business models
    Thiagarajan, RK
    Srivastava, AK
    Pujari, AK
    Bulusu, VK
    WECWIS 2002: FOURTH IEEE INTERNATIONAL WORKSHOP ON ADVANCED ISSUES OF E-COMMERCE AND WEB-BASED INFORMATION SYSTEMS, PROCEEDINGS, 2002, : 239 - 241
  • [37] Modeling and Enforcement of Business Policies on Process Models with Maestro
    Markovic, Ivan
    Jain, Sukesh
    El-Gayyar, Mahmoud
    Cremers, Armin B.
    Stojanovic, Nenad
    SEMANTIC WEB: RESEARCH AND APPLICATIONS, 2009, 5554 : 873 - +
  • [38] A method for insider threat assessment by modeling the internal employee interactions
    Sepehrzadeh, Hamed
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1385 - 1393
  • [39] Temporal Semantic Parsing for Insider Threat Activity Modeling and Detection
    AlSlaiman, Muhanned
    Wang, Christopher
    Salman, Mohammed
    Asiri, Ahmad
    IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, NAECON 2024, 2024, : 44 - 49
  • [40] A method for insider threat assessment by modeling the internal employee interactions
    Hamed Sepehrzadeh
    International Journal of Information Security, 2023, 22 : 1385 - 1393