Redefining insider threats: a distinction between insider hazards and insider threats

被引:0
|
作者
Mathias Reveraert
Tom Sauer
机构
[1] Universiteit Antwerpen Faculteit Politieke en Sociale Wetenschappen,
[2] Universiteit Antwerpen Faculteit Politieke en Sociale Wetenschappen,undefined
来源
Security Journal | 2021年 / 34卷
关键词
Insider threat; Insider hazard; Organizational culture; Organizational behavior; Security policy; Trust;
D O I
暂无
中图分类号
学科分类号
摘要
This article suggests a new definition of insiders and insider threats. It refrains from applying a harm-oriented perspective that concentrates on the insider’s intention to cause harm because it defines the insider threat either too narrow or too broad. Instead, a privilege-oriented perspective is applied that focuses on the insider’s intention to misuse his privileged access to or knowledge about the organizational assets. Because existing privilege-oriented definitions refrain from making an explicit and clear-cut division between intentional and unintentional misuse of privilege, a new conceptualization is suggested that distinguishes insider hazards from insider threats. If the insider unintentionally misuses his insider privilege, it concerns an insider hazard. If the insider intentionally misuses his insider privilege, it is regarded as an insider threat.
引用
收藏
页码:755 / 775
页数:20
相关论文
共 50 条
  • [21] Model Based Analysis of Insider Threats
    Chen, Taolue
    Han, Tingting
    Kammueller, Florian
    Nemli, Ibrahim
    Probst, Christian W.
    2016 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2016,
  • [22] Towards Formal Analysis of Insider Threats for Auctions
    Kammuller, Florian
    Kerber, Manfred
    Probst, Christian W.
    MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, : 23 - 34
  • [23] Predict insider threats using human behaviors
    Mills J.U.
    Stuban S.M.F.
    Dever J.
    IEEE Engineering Management Review, 2017, 45 (01): : 39 - 48
  • [24] Understanding and countering insider threats in software development
    Franz, Michael
    2008 INTERNATIONAL MCETECH CONFERENCE ON E-TECHNOLOGIES, PROCEEDINGS, 2007, : 81 - 90
  • [25] Detecting and Preventing Cyber Insider Threats: A Survey
    Liu, Liu
    De Vel, Olivier
    Han, Qing-Long
    Zhang, Jun
    Xiang, Yang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (02): : 1397 - 1417
  • [26] Mitigating Insider Threats on the Edge: A Knowledgebase Approach
    Althebyan, Qutaibah
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2020, 17 (4A) : 621 - 628
  • [27] Positioning Your Organization to Respond to Insider Threats
    Greitzer F.L.
    Purl J.
    Leong Y.M.
    Sticha P.J.
    IEEE Engineering Management Review, 1600, 47 (02): : 75 - 83
  • [28] Rising to the Challenge of Insider Threats for Middle Powers
    Modini, Jessemyn
    Van Zomeren, Mark
    Fowler, Stuart
    Joiner, Keith
    Lynar, Tim
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, : 521 - 529
  • [29] Mining for Insider Threats in Business Transactions and Processes
    Eberle, William
    Holder, Lawrence
    2009 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, 2009, : 163 - 170
  • [30] Access control requirements for preventing insider threats
    Park, Joon S.
    Giordano, Joseph
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 529 - 534