Autosoft Journal

Online Manuscript Access


Advanced Risk Measurement Approach to Insider Threats in Cyberspace


Authors



Abstract

Inside jobs have been a source of critical threats in cyberspace. To manage such insider threats, a proper measurement approach is required for effective risk-based decision-making. The measurement approach should include insider-related information (e.g. the significance of jobs, the position level, the required authority for data, and the type of employment) in order to better measure and analyze insider risks. In this paper, we suggest an approach that takes into account the insider-related information in calculating data leakage risk of insiders in the banking sector. We implement this approach by utilizing real-world data to calculate insider risks. We present an effective risk measurement approach, which we believe can enhance decision-making process for risk management for insider threats.


Keywords


Pages

Total Pages: 9
Pages: 405-413

DOI
10.1080/10798587.2015.1121617


Manuscript ViewPdf Subscription required to access this document

Obtain access this manuscript in one of the following ways


Already subscribed?

Need information on obtaining a subscription? Personal and institutional subscriptions are available.

Already an author? Have access via email address?


Published

Volume: 22
Issue: 3
Year: 2016

Cite this document


References

Anderson R. H. Research on mitigating the insider threat to information systems-# 2 (No. RAND-CF-163-DARPA)

Cappelli D. Common sense guide to prevention and detection of insider threats 3rd edition 1003)

Cho I. Research Briefs on Information & Communication Technology Evolution

https://doi.org/10.13089/JKIISC.2014.24.4.681

Clark D. Characterizing cyberspace: past, present and future

EU Commission Official Journal of the European Union

Gibson W. Neuromancer

Hathaway M. E. Preliminary considerations: On national cyber security, A.(red.)

Humphreys E. Implementing the ISO/IEC 27001 information security management system standard

Kroll Global Fraud Report 2013-2014

Lee S. IT Standard & Test TTA Journal

LinkedIn Group Partners Insider threat spotlight report 2015

Probst, Christian W. et al., eds. "Insider Threats in Cyber Security." Advances in Information Security (2010): n. pag. Crossref. Web. https://doi.org/10.1007/978-1-4419-7133-3

PwC 2012 global economic crime survey

PwC Global state of information security survey 2016

Probst, Christian W. et al., eds. "Insider Threats in Cyber Security." Advances in Information Security (2010): n. pag. Crossref. Web. https://doi.org/10.1007/978-1-4419-7133-3

Randazzo M. R. Insider threat study: Illicit cyber activity in the banking and finance sector

Riley S. Cyber terrain: A model for increased understanding of cyber activity

Seo S. 보안 경제학

Sim J. A Study on Information Access Control Policy Based on Risk Level of Security Incidents about IT Human Resources in Financial Institutions (Unpublished master’s thesis)

Jasper S. Securing freedom in the global commons

Lorents P. Informaatika teoreetilised alused. Struktuurne aspekt

United States Army Cyberspace operations concept capability plan 2016–2028

United States Department of Defense Joint Pub 1–02 2009: Department of Defense Dictionary of Military and Associated Terms

The White House Critical infrastructure protection (presidential decision directive 63)

Wiener N. Cybernetics or control and communication in the animal and the machine (25)

JOURNAL INFORMATION


ISSN PRINT: 1079-8587
ISSN ONLINE: 2326-005X
DOI PREFIX: 10.31209
10.1080/10798587 with T&F
IMPACT FACTOR: 0.652 (2017/2018)
Journal: 1995-Present




CONTACT INFORMATION


TSI Press
18015 Bullis Hill
San Antonio, TX 78258 USA
PH: 210 479 1022
FAX: 210 479 1048
EMAIL: tsiepress@gmail.com
WEB: http://www.wacong.org/tsi/