Redefining insider threats: a distinction between insider hazards and insider threats

被引:0
|
作者
Mathias Reveraert
Tom Sauer
机构
[1] Universiteit Antwerpen Faculteit Politieke en Sociale Wetenschappen,
[2] Universiteit Antwerpen Faculteit Politieke en Sociale Wetenschappen,undefined
来源
Security Journal | 2021年 / 34卷
关键词
Insider threat; Insider hazard; Organizational culture; Organizational behavior; Security policy; Trust;
D O I
暂无
中图分类号
学科分类号
摘要
This article suggests a new definition of insiders and insider threats. It refrains from applying a harm-oriented perspective that concentrates on the insider’s intention to cause harm because it defines the insider threat either too narrow or too broad. Instead, a privilege-oriented perspective is applied that focuses on the insider’s intention to misuse his privileged access to or knowledge about the organizational assets. Because existing privilege-oriented definitions refrain from making an explicit and clear-cut division between intentional and unintentional misuse of privilege, a new conceptualization is suggested that distinguishes insider hazards from insider threats. If the insider unintentionally misuses his insider privilege, it concerns an insider hazard. If the insider intentionally misuses his insider privilege, it is regarded as an insider threat.
引用
收藏
页码:755 / 775
页数:20
相关论文
共 50 条
  • [41] Game Theoretic Modeling of Insider Threats in an Organization
    Lalropuia, K. C.
    Goyal, Sanjeev
    de Soto, Borja Garcia
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT II, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14587 : 188 - 192
  • [42] Critical Analysis in the Research Area of Insider Threats
    Zaytsev, Anton
    Malyuk, Anatoly
    Miloslayskaya, Natalia
    2017 IEEE 5TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2017), 2017, : 288 - 296
  • [43] Detection of Temporal Insider Threats to Relational Databases
    Sallam, Asmaa
    Bertino, Elisa
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 406 - 415
  • [44] Reporting Insider Threats via Covert Channels
    Muchene, David N.
    Luli, Klevis
    Shue, Craig A.
    IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, : 68 - 71
  • [45] Game-theoretic modeling and analysis of insider threats
    Liu, Debin
    Wang, XiaoFeng
    Camp, Jean
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2008, 1 : 75 - 80
  • [46] Systematic analysis of security advice on the topic of insider threats
    Stewart, Andrew
    Hobbs, Christopher
    COMPUTERS & SECURITY, 2025, 154
  • [47] Analysis of Research on Specific Insider Information Security Threats
    Zaytsev, Anton
    Malyuk, Anatoly
    Miloslavskaya, Natalia
    RECENT ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, 2017, 570 : 725 - 735
  • [48] Insider Threats in Emerging Mobility-as-a-Service Scenarios
    Callegati, Franco
    Giallorenzo, Saverio
    Melis, Andrea
    Prandini, Marco
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2658 - 2667
  • [49] Insider Threats and Individual Differences: Intention and Unintentional Motivations
    Schoenherr, Jordan Richard
    IEEE Transactions on Technology and Society, 2022, 3 (03): : 175 - 184
  • [50] Modeling and Verification of Insider Threats Using Logical Analysis
    Kammuller, Florian
    Probst, Christian W.
    IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 534 - 545