Access control requirements for preventing insider threats

被引:0
|
作者
Park, Joon S. [1 ]
Giordano, Joseph
机构
[1] Syracuse Univ, Syracuse, NY 13244 USA
[2] USAF, Res Lab, AFRL, Informat Directorate, Rome, NY 13441 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today the Intelligence Community (IC) has faced increasing challenges of insider threats. It is generally accepted that, the cost of insider threats exceeds that of outsider threats. Although the currently available access control approaches have a great potential for preventing insider threats, there are still critical obstacles to be solved, especially in large-scale computing environments. In this paper we discuss those requirements with respect to scalability, granularity, and context-awareness. For each requirement we discussed related problems, techniques, and basic approaches to the corresponding countermeasures. Detailed solutions and implementations are not described in this paper.
引用
收藏
页码:529 / 534
页数:6
相关论文
共 50 条
  • [1] Techniques and countermeasures for preventing insider threats
    Alsowail R.A.
    Al-Shehari T.
    PeerJ Computer Science, 2022, 8
  • [2] Techniques and countermeasures for preventing insider threats
    Alsowail, Rakan A.
    Al-Shehari, Taher
    PEERJ COMPUTER SCIENCE, 2022, 8
  • [3] Using Access Control to Mitigate Insider Threats to Healthcare Systems
    Alshehri, Suhair
    Mishra, Sumita
    Raj, Rajendra K.
    2016 IEEE INTERNATIONAL CONFERENCE ON HEALTHCARE INFORMATICS (ICHI), 2016, : 55 - 60
  • [4] Detecting and Preventing Cyber Insider Threats: A Survey
    Liu, Liu
    De Vel, Olivier
    Han, Qing-Long
    Zhang, Jun
    Xiang, Yang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (02): : 1397 - 1417
  • [5] An adaptive risk management and access control framework to mitigate insider threats
    Baracaldo, Nathalie
    Joshi, James
    COMPUTERS & SECURITY, 2013, 39 : 237 - 254
  • [6] Preventing Insider Malware Threats Using Program Analysis Techniques
    Agrawal, Hira
    Alberi, James
    Bahler, Lisa
    Conner, William
    Micallef, Josephine
    Virodov, Alexandr
    Snyder, Shane R.
    MILITARY COMMUNICATIONS CONFERENCE, 2010 (MILCOM 2010), 2010, : 936 - 941
  • [7] Micromovement Behavior as an Intention Detection Measurement for Preventing Insider Threats
    Almehmadi, Abdulaziz
    IEEE ACCESS, 2018, 6 : 40626 - 40637
  • [8] Redefining insider threats: a distinction between insider hazards and insider threats
    Mathias Reveraert
    Tom Sauer
    Security Journal, 2021, 34 : 755 - 775
  • [9] Redefining insider threats: a distinction between insider hazards and insider threats
    Reveraert, Mathias
    Sauer, Tom
    SECURITY JOURNAL, 2021, 34 (04) : 755 - 775
  • [10] Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics
    Eberz, Simon
    Rasmussen, Kasper B.
    Lenders, Vincent
    Martinovic, Ivan
    22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,