Enemies within: Redefining the insider threat in organizational security policy

被引:0
|
作者
David S Wall
机构
[1] Criminology,
[2] SASS,undefined
[3] Durham University,undefined
来源
Security Journal | 2013年 / 26卷
关键词
information security; security policy; cybercrime; organizations; insider threat;
D O I
暂无
中图分类号
学科分类号
摘要
The critical importance of electronic information exchanges in the daily operation of most large modern organizations is causing them to broaden their security provision to include the custodians of exchanged data – the insiders. The prevailing data loss threat model mainly focuses upon the criminal outsider and mainly regards the insider threat as ‘outsiders by proxy’, thus shaping the relationship between the worker and workplace in information security policy. A policy that increasingly takes the form of social policy for the information age as it acquires the power to include and exclude sections of society and potentially to re-stratify it? This article draws upon empirical sources to critically explore the insider threat in organizations. It looks at the prevailing threat model before deconstructing ‘the insider’ into various risk profiles, including the well-meaning insider, before drawing conclusions about what the building blocks of information security policy around the insider might be.
引用
收藏
页码:107 / 124
页数:17
相关论文
共 50 条
  • [31] Detecting Insider Threat via a Cyber-Security Culture Framework
    Georgiadou, Anna
    Mouzakitis, Spiros
    Askounis, Dimitris
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2022, 62 (04) : 706 - 716
  • [32] External Insider Threat: a Real Security Challenge in Enterprise Value Webs
    Franqueira, Virginia N. L.
    van Cleeff, Andre
    van Eck, Pascal
    Wieringa, Roel
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 446 - 453
  • [33] Threat-adaptive security policy
    Venkatesan, RM
    Bhattacharya, S
    1977 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE, 1997, : 525 - 531
  • [34] E-Watcher: insider threat monitoring and detection for enhanced security
    Wei, Zhiyuan
    Rauf, Usman
    Mohsen, Fadi
    ANNALS OF TELECOMMUNICATIONS, 2024, 79 (11-12) : 819 - 831
  • [35] An Artificial Neural Network Autoencoder for Insider Cyber Security Threat Detection
    Saminathan, Karthikeyan
    Mulka, Sai Tharun Reddy
    Damodharan, Sangeetha
    Maheswar, Rajagopal
    Lorincz, Josip
    FUTURE INTERNET, 2023, 15 (12)
  • [36] A Framework for Data-Driven Physical Security and Insider Threat Detection
    Mavroeidis, Vasileios
    Vishi, Kamer
    Josang, Audun
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2018, : 1108 - 1115
  • [37] CONCEPTS OF THREAT AND SECURITY POLICY - REPLY
    LODGAARD, S
    INTERNASJONAL POLITIKK, 1977, (01) : 178 - 180
  • [38] Platform-Dependent Computer Security Complacency: The Unrecognized Insider Threat
    Stafford, Thomas F.
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2022, 69 (06) : 3814 - 3825
  • [39] The Danger Within: Insider Threat Modeling Using Business Process Models
    von der Assen, Jan
    Hochuli, Jasmin
    Grubl, Thomas
    Stiller, Burkhard
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 186 - 192
  • [40] A Review of the Insider Threat, a Practitioner Perspective Within the UK Financial Services
    Whitelaw, Findlay
    Riley, Jackie
    Elmrabit, Nebrase
    IEEE ACCESS, 2024, 12 : 34752 - 34768