메뉴 건너뛰기




Volumn , Issue , 2012, Pages 2402-2411

Insider threat behavior factors: A comparison of theory with reported incidents

Author keywords

[No Author keywords available]

Indexed keywords

LOSSES;

EID: 84857929348     PISSN: 15301605     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2012.326     Document Type: Conference Paper
Times cited : (21)

References (53)
  • 2
    • 48249109086 scopus 로고    scopus 로고
    • A knowledge-based bayesian model for analyzing a system after an insider attack
    • ed. S. Jajodia, P. Samarati and S. Cimato. Springer Boston
    • Althebyan, Q., and B. Panda. 2008. A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack. In Proceedings of The IFIP TC 11 23rd International Information Security Conference, ed. S. Jajodia, P. Samarati and S. Cimato, 557-571. Springer Boston.
    • (2008) Proceedings of the IFIP TC 11 23rd International Information Security Conference , pp. 557-571
    • Althebyan, Q.1    Panda, B.2
  • 4
    • 84857948002 scopus 로고    scopus 로고
    • The insider attack problem nature and scope
    • ed. S. J. Stolfo, S. M. Bellovin, A. D. Keromytis, S. Hershkop, S. W. Smith and S. Sinclair. Springer US
    • Bellovin, S. M. 2008. The Insider Attack Problem Nature and Scope. In Insider Attack and Cyber Security, ed. S. J. Stolfo, S. M. Bellovin, A. D. Keromytis, S. Hershkop, S. W. Smith and S. Sinclair, 1-4. Springer US.
    • (2008) Insider Attack and Cyber Security , pp. 1-4
    • Bellovin, S.M.1
  • 5
    • 2342598277 scopus 로고    scopus 로고
    • Computer security impaired by legitimate users
    • Besnard, D., and B. Arief. 2004. Computer Security Impaired by Legitimate Users.Computers & Security 23 (3): 253-264.
    • (2004) Computers & Security , vol.23 , Issue.3 , pp. 253-264
    • Besnard, D.1    Arief, B.2
  • 11
  • 12
    • 84857982693 scopus 로고    scopus 로고
    • The new cyber gang - A real threat profile
    • Cohen, F. 2001. The New Cyber Gang - A Real Threat Profile.N etwork Security 2001 (5): 15-17.
    • (2001) N Etwork Security , vol.2001 , Issue.5 , pp. 15-17
    • Cohen, F.1
  • 14
    • 84855851700 scopus 로고    scopus 로고
    • Human factors in information security: The insider threat - Who can you trust these days?
    • In Press, Corrected Proof
    • Colwill, C. 2010. Human factors in information security: The insider threat - Who can you trust these days? Information Security Technical Report In Press, Corrected Proof
    • (2010) Information Security Technical Report
    • Colwill, C.1
  • 15
    • 34250765327 scopus 로고    scopus 로고
    • Insider threat monitoring is enhanced by asset relevance
    • Contos, B. 2007. Insider threat monitoring is enhanced by asset relevance.Infosecurity 4 (2): 47-47.
    • (2007) Infosecurity , vol.4 , Issue.2 , pp. 47-47
    • Contos, B.1
  • 16
    • 57649102137 scopus 로고    scopus 로고
    • Assessing the insider-outsider threat' duality in the context of the development of public-private partnerships delivering choice' in healthcare services: A sociomaterial critique
    • Crinson, I. 2008. Assessing the insider-outsider threat' duality in the context of the development of public-private partnerships delivering choice' in healthcare services: A sociomaterial critique.I nformation Security Technical Report 13 (4): 202-206.
    • (2008) I Nformation Security Technical Report , vol.13 , Issue.4 , pp. 202-206
    • Crinson, I.1
  • 17
    • 51549105272 scopus 로고    scopus 로고
    • You're only human
    • Dallaway, E. 2008. You're only human. Infosecurity 5 (6): 7-7.
    • (2008) Infosecurity , vol.5 , Issue.6 , pp. 7-7
    • Dallaway, E.1
  • 19
    • 3142683286 scopus 로고    scopus 로고
    • Enemies within: The problem of insider attacks
    • Furnell, S. 2004. Enemies within: the problem of insider attacks.Computer Fraud & Security 2004 (7): 6-11.
    • (2004) Computer Fraud & Security , vol.2004 , Issue.7 , pp. 6-11
    • Furnell, S.1
  • 20
    • 33749469542 scopus 로고    scopus 로고
    • Malicious or misinformed? Exploring a contributor to the insider threat
    • Furnell, S. 2006. Malicious or misinformed? Exploring a contributor to the insider threat.Computer Fraud & Security 2006 (9): 8-12.
    • (2006) Computer Fraud & Security , vol.2006 , Issue.9 , pp. 8-12
    • Furnell, S.1
  • 21
    • 40749094831 scopus 로고    scopus 로고
    • Addressing the insider threat
    • Fyffe, G. 2008. Addressing the insider threat. Network Security 2008 (3): 11-14.
    • (2008) Network Security , vol.2008 , Issue.3 , pp. 11-14
    • Fyffe, G.1
  • 26
    • 0011432676 scopus 로고
    • Deficiencies of the traditional approach to information security and the requirements for a new methodology
    • Hitchings, J. 1995. Deficiencies of the traditional approach to information security and the requirements for a new methodology. Computers & Security 14 (5): 377-383.
    • (1995) Computers & Security , vol.14 , Issue.5 , pp. 377-383
    • Hitchings, J.1
  • 27
    • 84857936760 scopus 로고    scopus 로고
    • Behavorial parameters of trustworthiness for countering insider threats
    • Ho, S. M. 2008. Behavorial parameters of trustworthiness for countering insider threats. In The Third Annual iConference.
    • (2008) The Third Annual IConference
    • Ho, S.M.1
  • 30
    • 21244441178 scopus 로고    scopus 로고
    • Barbarians inside the gates: Addressing internal security threats
    • Kemp, M. 2005. Barbarians inside the gates: addressing internal security threats. Network Security 2005 (6): 11-13.
    • (2005) Network Security , vol.2005 , Issue.6 , pp. 11-13
    • Kemp, M.1
  • 34
    • 70350366164 scopus 로고    scopus 로고
    • Mitigating inadvertent insider threats with incentives
    • ed. R. Dingledine and P. Golle. Springer Berlin / Heidelberg
    • Liu, D., X. Wang, and L. Camp. 2009. Mitigating Inadvertent Insider Threats with Incentives. In Financial Cryptography and Data Security, ed. R. Dingledine and P. Golle, 1-16. Springer Berlin / Heidelberg.
    • (2009) Financial Cryptography and Data Security , pp. 1-16
    • Liu, D.1    Wang, X.2    Camp, L.3
  • 35
    • 0036173202 scopus 로고    scopus 로고
    • Insider threat prediction tool: Evaluating the probability of IT misuse
    • Magklaras, G. B., and S. M. Furnell. 2001. Insider Threat Prediction Tool: Evaluating the probability of IT misuse. Computers & Security 21 (1): 62-73.
    • (2001) Computers & Security , vol.21 , Issue.1 , pp. 62-73
    • Magklaras, G.B.1    Furnell, S.M.2
  • 36
    • 24344460927 scopus 로고    scopus 로고
    • A preliminary model of end user sophistication for insider threat prediction in IT systems
    • Magklaras, G. B., and S. M. Furnell. 2005. A preliminary model of end user sophistication for insider threat prediction in IT systems. Computers & Security 24 (5): 371-380.
    • (2005) Computers & Security , vol.24 , Issue.5 , pp. 371-380
    • Magklaras, G.B.1    Furnell, S.M.2
  • 41
    • 28844434096 scopus 로고    scopus 로고
    • Criminal profiling and insider cyber crime
    • Nykodym, N., R. Taylor, and J. Vilela. 2005. Criminal profiling and insider cyber crime. Digital Investigation 2 (4): 261-267.
    • (2005) Digital Investigation , vol.2 , Issue.4 , pp. 261-267
    • Nykodym, N.1    Taylor, R.2    Vilela, J.3
  • 42
    • 34047201737 scopus 로고    scopus 로고
    • Using PLSI-U to detect insider threats from email traffic
    • ed. M. Olivier and S. Shenoi. Springer Boston
    • Okolica, J., G. Peterson, and R. Mills. 2006. Using PLSI-U To Detect Insider Threats from Email Traffic. In Advances in Digital Forensics II, ed. M. Olivier and S. Shenoi, 91-103. Springer Boston.
    • (2006) Advances in Digital Forensics , vol.2 , pp. 91-103
    • Okolica, J.1    Peterson, G.2    Mills, R.3
  • 43
    • 84857501902 scopus 로고    scopus 로고
    • Reflections on the insider threat
    • ed. S. J. Stolfo, S. M. Bellovin, A. D. Keromytis, S. Hershkop, S. W. Smith and S. Sinclair. Springer US
    • Pfleeger, C. P. 2008. Reflections on the Insider Threat. In Insider Attack and Cyber Security, ed. S. J. Stolfo, S. M. Bellovin, A. D. Keromytis, S. Hershkop, S. W. Smith and S. Sinclair, 5-16. Springer US.
    • (2008) Insider Attack and Cyber Security , pp. 5-16
    • Pfleeger, C.P.1
  • 46
    • 77956648928 scopus 로고    scopus 로고
    • Virtual battlefield
    • Royds, J. 2009. Virtual battlefield. CIR Magazine.
    • (2009) CIR Magazine
    • Royds, J.1
  • 47
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • Schultz, E. E. 2002. A framework for understanding and predicting insider attacks. Computers & Security 21 (6): 526-531.
    • (2002) Computers & Security , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.E.1
  • 48
    • 0010886652 scopus 로고    scopus 로고
    • The insider threat to information systems1. The psychology of the dangerous insider
    • Shaw, E., K. G. Ruby, and J. M. Post. 2005. The insider threat to information systems1. the psychology of the dangerous insider. Security Awareness Bulletin, No. 2-98.
    • (2005) Security Awareness Bulletin , Issue.2-98
    • Shaw, E.1    Ruby, K.G.2    Post, J.M.3
  • 49
    • 33644904044 scopus 로고    scopus 로고
    • The role of behavioral research and profiling in malicious cyber insider investigations
    • Shaw, E. D. 2006. The role of behavioral research and profiling in malicious cyber insider investigations. Digital Investigation 3 (1): 20-31.
    • (2006) Digital Investigation , vol.3 , Issue.1 , pp. 20-31
    • Shaw, E.D.1
  • 51
    • 57649220126 scopus 로고    scopus 로고
    • Practical management of malicious insider threat - An enterprise CSIRT perspective
    • Walker, T. 2008. Practical management of malicious insider threat - An enterprise CSIRT perspective. Information Security Technical Report 13 (4): 225-234.
    • (2008) Information Security Technical Report , vol.13 , Issue.4 , pp. 225-234
    • Walker, T.1
  • 52
    • 33751218304 scopus 로고    scopus 로고
    • Balancing the insider and outsider threat
    • Walton, R., and W.-M. Limited. 2006. Balancing the insider and outsider threat. Computer Fraud & Security 2006 (11): 8-11.
    • (2006) Computer Fraud & Security , vol.2006 , Issue.11 , pp. 8-11
    • Walton, R.1    Limited, W.-M.2
  • 53
    • 71549155293 scopus 로고    scopus 로고
    • Automatic identification of critical data items in a database to mitigate the effects of malicious insiders
    • ed. A. Prakash and I. Sen Gupta. Springer Berlin / Heidelberg
    • White, J., and B. Panda. 2009. Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders. In Information Systems Security, ed. A. Prakash and I. Sen Gupta, 208-221. Springer Berlin / Heidelberg.
    • (2009) Information Systems Security , pp. 208-221
    • White, J.1    Panda, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.