The Dark Triad and Insider Threats in Cyber Security

被引:9
|
作者
Maasberg, Michele [1 ]
Van Slyke, Craig [2 ]
Ellis, Selwyn [3 ]
Beebe, Nicole [4 ]
机构
[1] Johns Hopkins Univ, Appl Phys Lab, Johns Hopkins Rd, Laurel, MD 20723 USA
[2] Louisiana Tech Univ, Informat Syst, Ruston, LA 71270 USA
[3] Louisiana Tech Univ, Grad Programs, Ruston, LA 71270 USA
[4] Univ Texas San Antonio, Cyber Ctr Secur & Analyt, San Antonio, TX USA
关键词
PERSONALITY; FRAMEWORK; WORK;
D O I
10.1145/3408864
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Tracing the relationship between pathological personality traits and insider cyber sabotage is critical to addressing cyber threats in real-time. Understanding the individual, social, and organizational influences on insider threats is important to the development of security-related policies and controls. Cyber sabotage as part of a broader insider threat issue is addressed in the context of an organizational security risk management plan. Such plans should include security controls intended to mitigate the risk of a human threat from the inside. In the US, in some cases in which classified material is involved, formal insider threat cyber security programs are mandated by Presidential Executive Order. The security controls prescribed by insider threat programs often include automated employee monitoring systems for detection, education and training programs for awareness.
引用
收藏
页码:64 / 70
页数:7
相关论文
共 50 条
  • [2] Risk Assessment Method for Insider Threats in Cyber Security: A Review
    Hashim, Nurul Akmal
    Abidin, Zaheera Zainal
    Zakaria, Nurul Azma
    Ahmad, Rabiah
    Puvanasvaran, A. P.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (11) : 126 - 130
  • [3] Insider Threats in Information Security
    Elmrabit, Ncbrase
    Yang, Shuang-Hua
    Yang, Lili
    2015 21ST INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2015, : 108 - 113
  • [4] THREATS TO CYBER SECURITY
    Tudor, Ana-Maria
    LAW BETWEEN MODERNIZATION AND TRADITION - IMPLICATIONS FOR THE LEGAL, POLITICAL, ADMINISTRATIVE AND PUBLIC ORDER ORGANIZATION, 2015, : 659 - 664
  • [5] Insider threats among Dutch SMEs: Nature and extent of incidents, and cyber security measures
    Moneva, Asier
    Leukfeldt, Rutger
    JOURNAL OF CRIMINOLOGY, 2023, 56 (04): : 416 - 440
  • [6] Detecting and Preventing Cyber Insider Threats: A Survey
    Liu, Liu
    De Vel, Olivier
    Han, Qing-Long
    Zhang, Jun
    Xiang, Yang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (02): : 1397 - 1417
  • [7] Insider Threats to IT Security of Critical Infrastructures
    Gaidarski, Ivan
    Minchev, Zlatogor
    Studies in Big Data, 2021, 84 : 381 - 394
  • [8] The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
    Lehto, Martti
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (03) : 1 - 18
  • [9] Aviation and Cyber security threats
    Lehto, Martti
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON CLOUD SECURITY AND MANAGEMENT (ICCSM-2015), 2015, : 197 - 197
  • [10] A Survey on Cyber Security Threats
    Gulshan
    Chauhan, Sansar Singh
    Proceedings of International Conference on Technological Advancements and Innovations, ICTAI 2021, 2021, : 218 - 223