Saxena, NeeteshHayes, EmmaBertino, ElisaOjo, PatrickChoo, Kim-Kwang RaymondBurnap, Pete2021-04-192021-04-192020-09-07Electronics 9 (9): 1460 (2020)https://hdl.handle.net/20.500.12588/516The insider threat has consistently been identified as a key threat to organizations and governments. Understanding the nature of insider threats and the related threat landscape can help in forming mitigation strategies, including non-technical means. In this paper, we survey and highlight challenges associated with the identification and detection of insider threats in both public and private sector organizations, especially those part of a nation's critical infrastructure. We explore the utility of the cyber kill chain to understand insider threats, as well as understanding the underpinning human behavior and psychological factors. The existing defense techniques are discussed and critically analyzed, and improvements are suggested, in line with the current state-of-the-art cyber security requirements. Finally, open problems related to the insider threat are identified and future research directions are discussed.Attribution 4.0 United Stateshttps://creativecommons.org/licenses/by/4.0/cyber kill chaininsider threatattack vectorsImpact and Key Challenges of Insider Threats on Organizations and Critical BusinessesArticle2021-04-19