A Method of Evaluation for Insider Threat
Title | A Method of Evaluation for Insider Threat |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Yi-Lu Wang, Sang-Chin Yang |
Conference Name | Computer, Consumer and Control (IS3C), 2014 International Symposium on |
Date Published | June |
Keywords | Analytical models, cloud computing, Computer crime, Computers, cyber security, Educational institutions, insider threat, insider threat analysis, insider threat evaluation, insider threat mitigation, Organizations, pubcrawl, security of data, System Dynamic, vulnerability scanner |
Abstract | Due to cyber security is an important issue of the cloud computing. Insider threat becomes more and more important for cyber security, it is also much more complex issue. But till now, there is no equivalent to a vulnerability scanner for insider threat. We survey and discuss the history of research on insider threat analysis to know system dynamics is the best method to mitigate insider threat from people, process, and technology. In the paper, we present a system dynamics method to model insider threat. We suggest some concludes for future research who are interested in insider threat issue The study. |
URL | https://ieeexplore.ieee.org/document/6845913/ |
DOI | 10.1109/IS3C.2014.121 |
Citation Key | 6845913 |