Show brief item record

dc.contributor.authorSaxena, Neetesh
dc.contributor.authorHayes, Emma
dc.contributor.authorBertino, Elisa
dc.contributor.authorOjo, Patrick
dc.contributor.authorChoo, Kim-Kwang Raymond
dc.contributor.authorBurnap, Pete
dc.date.accessioned2021-04-19T15:22:36Z
dc.date.available2021-04-19T15:22:36Z
dc.date.issued9/7/2020
dc.identifierdoi: 10.3390/electronics9091460
dc.identifier.citationElectronics 9 (9): 1460 (2020)
dc.identifier.urihttps://hdl.handle.net/20.500.12588/516
dc.description.abstractThe insider threat has consistently been identified as a key threat to organizations and governments. Understanding the nature of insider threats and the related threat landscape can help in forming mitigation strategies, including non-technical means. In this paper, we survey and highlight challenges associated with the identification and detection of insider threats in both public and private sector organizations, especially those part of a nation’s critical infrastructure. We explore the utility of the cyber kill chain to understand insider threats, as well as understanding the underpinning human behavior and psychological factors. The existing defense techniques are discussed and critically analyzed, and improvements are suggested, in line with the current state-of-the-art cyber security requirements. Finally, open problems related to the insider threat are identified and future research directions are discussed.
dc.titleImpact and Key Challenges of Insider Threats on Organizations and Critical Businesses
dc.date.updated2021-04-19T15:22:36Z


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show brief item record