The insider threat has long been considered one of the most serious threats in computer security, and one of the most difficult to combat. But the problem has never been defined precisely, and that lack of precise definition inhibits solutions. This paper presents a precise definition of insider threat, and shows how the definition enables an analysis of the set of problems traditionally lumped into "the insider threat." It introduces a hierarchy of policy abstractions, and argues that the discrepancies between the different layers of abstraction expose the potential for insider threat. It also presents a methodology for analyzing the threat based upon our definitions. In the process, we introduce Attribute-Based Group Access Control, a gen...
Ever since people first began to communicate, they have implemented technologies to support the exch...
In their guest editors' introduction to the special issue on Insider Threat, Shari Lawrence Pfleeger...
AbstractThe most dangerous threats faced by organizations are insider attacks. Since insiders are aw...
The insider threat has long been considered one of the most serious threats in computer security, an...
Recent surveys indicate that the financial impact and operating losses due to insider intrusions are...
Much of the literature on insider threat assumes, explicitly or implicitly, a binary, perimeter-base...
Abstract As insider threats pose very significant security risks to IT systems, we ask what policy-b...
Threats from the inside of an organization’s perimeters are a significant problem, since it is diffi...
As insider threats pose very significant security risks to IT systems, we ask what policy-based appr...
Insider Attacks are one of the most dangerous threats organizations face today. An insider attack oc...
An insider is a person that has or had a legitimate right to access computing resources of an organi...
Threat from internal sources is one of the most serious problems organizations word-wide encounter n...
<p>Malicious insiders pose a threat to the confidentiality, integrity, and availability of an organi...
Insider threat is becoming comparable to outsider threat in frequency of security events. This is a ...
The insider threat faced by corporations and governments today is a real and significant problem, an...
Ever since people first began to communicate, they have implemented technologies to support the exch...
In their guest editors' introduction to the special issue on Insider Threat, Shari Lawrence Pfleeger...
AbstractThe most dangerous threats faced by organizations are insider attacks. Since insiders are aw...
The insider threat has long been considered one of the most serious threats in computer security, an...
Recent surveys indicate that the financial impact and operating losses due to insider intrusions are...
Much of the literature on insider threat assumes, explicitly or implicitly, a binary, perimeter-base...
Abstract As insider threats pose very significant security risks to IT systems, we ask what policy-b...
Threats from the inside of an organization’s perimeters are a significant problem, since it is diffi...
As insider threats pose very significant security risks to IT systems, we ask what policy-based appr...
Insider Attacks are one of the most dangerous threats organizations face today. An insider attack oc...
An insider is a person that has or had a legitimate right to access computing resources of an organi...
Threat from internal sources is one of the most serious problems organizations word-wide encounter n...
<p>Malicious insiders pose a threat to the confidentiality, integrity, and availability of an organi...
Insider threat is becoming comparable to outsider threat in frequency of security events. This is a ...
The insider threat faced by corporations and governments today is a real and significant problem, an...
Ever since people first began to communicate, they have implemented technologies to support the exch...
In their guest editors' introduction to the special issue on Insider Threat, Shari Lawrence Pfleeger...
AbstractThe most dangerous threats faced by organizations are insider attacks. Since insiders are aw...