Visible to the public A Method of Evaluation for Insider Threat

TitleA Method of Evaluation for Insider Threat
Publication TypeConference Paper
Year of Publication2014
AuthorsYi-Lu Wang, Sang-Chin Yang
Conference NameComputer, Consumer and Control (IS3C), 2014 International Symposium on
Date PublishedJune
KeywordsAnalytical models, cloud computing, Computer crime, Computers, cyber security, Educational institutions, insider threat, insider threat analysis, insider threat evaluation, insider threat mitigation, Organizations, pubcrawl, security of data, System Dynamic, vulnerability scanner
Abstract

Due to cyber security is an important issue of the cloud computing. Insider threat becomes more and more important for cyber security, it is also much more complex issue. But till now, there is no equivalent to a vulnerability scanner for insider threat. We survey and discuss the history of research on insider threat analysis to know system dynamics is the best method to mitigate insider threat from people, process, and technology. In the paper, we present a system dynamics method to model insider threat. We suggest some concludes for future research who are interested in insider threat issue The study.

URLhttps://ieeexplore.ieee.org/document/6845913/
DOI10.1109/IS3C.2014.121
Citation Key6845913