Redefining insider threats: a distinction between insider hazards and insider threats

被引:0
|
作者
Mathias Reveraert
Tom Sauer
机构
[1] Universiteit Antwerpen Faculteit Politieke en Sociale Wetenschappen,
[2] Universiteit Antwerpen Faculteit Politieke en Sociale Wetenschappen,undefined
来源
Security Journal | 2021年 / 34卷
关键词
Insider threat; Insider hazard; Organizational culture; Organizational behavior; Security policy; Trust;
D O I
暂无
中图分类号
学科分类号
摘要
This article suggests a new definition of insiders and insider threats. It refrains from applying a harm-oriented perspective that concentrates on the insider’s intention to cause harm because it defines the insider threat either too narrow or too broad. Instead, a privilege-oriented perspective is applied that focuses on the insider’s intention to misuse his privileged access to or knowledge about the organizational assets. Because existing privilege-oriented definitions refrain from making an explicit and clear-cut division between intentional and unintentional misuse of privilege, a new conceptualization is suggested that distinguishes insider hazards from insider threats. If the insider unintentionally misuses his insider privilege, it concerns an insider hazard. If the insider intentionally misuses his insider privilege, it is regarded as an insider threat.
引用
收藏
页码:755 / 775
页数:20
相关论文
共 50 条
  • [31] The Dark Triad and Insider Threats in Cyber Security
    Maasberg, Michele
    Van Slyke, Craig
    Ellis, Selwyn
    Beebe, Nicole
    COMMUNICATIONS OF THE ACM, 2020, 63 (12) : 64 - 70
  • [32] A Multidimension Taxonomy of Insider Threats in Cloud Computing
    Alhanahnah, Mohannad J.
    Jhumka, Arshad
    Alouneh, Sahel
    COMPUTER JOURNAL, 2016, 59 (11): : 1612 - 1622
  • [33] Detecting Insider Threats Through Language Change
    Taylor, Paul J.
    Dando, Coral J.
    Ormerod, Thomas C.
    Ball, Linden J.
    Jenkins, Marisa C.
    Sandham, Alexandra
    Menacere, Tarek
    LAW AND HUMAN BEHAVIOR, 2013, 37 (04) : 267 - 275
  • [34] A Data-Driven Evaluation for Insider Threats
    Sun, Yuqing
    Xu, Haoran
    Bertino, Elisa
    Sun, Chao
    DATA SCIENCE AND ENGINEERING, 2016, 1 (02) : 73 - 85
  • [35] Explaining and Aggregating Anomalies to Detect Insider Threats
    Goldberg, Henry G.
    Young, Willam T.
    Memory, Alex
    Senator, Ted E.
    PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 2739 - 2748
  • [36] Introduction to the special issue on insider threats in cybersecurity
    Da Veiga, Adele
    Furnell, Steven
    Hong, Yuxiang
    Warkentin, Merrill
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 79
  • [37] How to balance insider threats and employee privacy
    Kohen, Isaac, 1600, Information Systems Audit and Control Association (ISACA) (03):
  • [38] Cloud Computing: A paradigm of more Insider Threats
    Bin Ahmad, Maaz
    Asif, Muhammad
    Saad, Afshan
    Wahab, Abdul
    2019 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS ENGINEERING (ICISE 2019), 2019, : 107 - 112
  • [39] Introduction to the Minitrack on Insider Threats to Governments and Organizations
    Bishop, Matt
    Kesan, Jay
    Clark, Jason
    PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2018, : 2434 - 2434
  • [40] A Bayesian Network Model for Predicting Insider Threats
    Axelrad, Elise T.
    Sticha, Paul J.
    Brdiczka, Oliver
    Shen, Jianqiang
    IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, : 82 - 89