Abstract

The increasing prevalence of cybercrime necessitates the implementation of robust security measures. The majority of these attacks are initiated by authorized users who possess knowledge of the system vulnerabilities. Thus, insider attack prevention (ITP) strategies need to be explored to ensure the security of organizations. This review comprehensively examines the existing literature on ITP methods, focusing on recent developments and their implementation in various corporations. This review categorizes and classifies different types of insider attacks and their corresponding prevention and detection techniques. This paper also introduces a multi-tiered activity monitoring model that integrates network, system, and physical security measures to provide comprehensive defense against insider threats. This review also provides a detailed taxonomy that classifies insider threats based on insider type, access level, and targeted security objectives. Finally, future directions for ITP are explored, highlighting the open issues and challenges that need to be addressed.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.