Access control requirements for preventing insider threats

被引:0
|
作者
Park, Joon S. [1 ]
Giordano, Joseph
机构
[1] Syracuse Univ, Syracuse, NY 13244 USA
[2] USAF, Res Lab, AFRL, Informat Directorate, Rome, NY 13441 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today the Intelligence Community (IC) has faced increasing challenges of insider threats. It is generally accepted that, the cost of insider threats exceeds that of outsider threats. Although the currently available access control approaches have a great potential for preventing insider threats, there are still critical obstacles to be solved, especially in large-scale computing environments. In this paper we discuss those requirements with respect to scalability, granularity, and context-awareness. For each requirement we discussed related problems, techniques, and basic approaches to the corresponding countermeasures. Detailed solutions and implementations are not described in this paper.
引用
收藏
页码:529 / 534
页数:6
相关论文
共 50 条
  • [11] Insider threats
    Hobbs, Christopher
    INTERNATIONAL AFFAIRS, 2019, 95 (03) : 725 - 726
  • [12] Preventing insider threats to enhance organizational security: The role of opportunity-reducing techniques
    Jeong, Myeongki
    Zo, Hangjung
    TELEMATICS AND INFORMATICS, 2021, 63
  • [13] Identifying Indicators of Insider Threats: Insider IT Sabotage
    Claycomb, William R.
    Huth, Carly L.
    Phillips, Brittany
    Flynn, Lori
    McIntire, David
    2013 47TH INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2013,
  • [14] A primer on insider threats in cybersecurity
    Prabhu, Sunitha
    Thompson, Nik
    INFORMATION SECURITY JOURNAL, 2022, 31 (05): : 602 - 611
  • [15] Social engineering and Insider threats
    LiuXiangyu
    LiQiuyang
    Chandel, Sonali
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 25 - 34
  • [16] Isabelle Modelchecking for Insider Threats
    Kammuller, Florian
    DATA PRIVACY MANAGEMENT AND SECURITY ASSURANCE, 2016, 9963 : 196 - 210
  • [17] Modelling of Enterprise Insider Threats
    Roy, Puloma
    Mazumdar, Chandan
    2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2015, : 132 - 136
  • [18] Identifying and Mitigating Insider Threats
    Probst, Christian W.
    IT-INFORMATION TECHNOLOGY, 2011, 53 (04): : 202 - 206
  • [19] Insider Threats in Information Security
    Elmrabit, Ncbrase
    Yang, Shuang-Hua
    Yang, Lili
    2015 21ST INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2015, : 108 - 113
  • [20] Preventing Advanced Persistent Threats in Complex Control Networks
    Rubio, Juan E.
    Alcaraz, Cristina
    Lopez, Javier
    COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 402 - 418