Abstract

Insider threat has been recognized as one of the most dangerous security threats and become a much more complex issue. Insider threat is resulted from the legitimate users abusing their privileges and cause tremendous damage or losses. Not always being friends, insiders can be main threats to the organization. Currently, there is no equivalent prevention solution for insider threat to an intrution prevention system or vulnerability scanner. From the survey of literature of insider threat studies, we conclude that the system dynamics (SD) is an effective tool to analyze the root causes of insider threat incidents and evaluate mitigation strategies from people, process, and technology perspectives. A generized case based SD model can be tailored and applied to analyze and evaluate specific insider threat incidents. We present a well known insider threat incident of Taiwan and tailor the generized case based SD model to analyze it. The simulation results indicate that the risk of insider threats can be reduced and the probability of detecting insider threats can be increased.

Highlights

  • Information technologies occupy a pivotal position in critical infrastructures protection, but they are changing due to innovate rapidly

  • This paper provides interactive simulation-based experiments to demonstrate the ability of the model to create insider behaviour profiles that accurately reflect the risks and mitigations involved in the insider threat problem, as well as the model’s efficiency

  • We construct a tailored model that presents the prevention of insider threat in a well-known enterprise by means of a system dynamics and feedback learning perspective

Read more

Summary

Introduction

Information technologies occupy a pivotal position in critical infrastructures protection, but they are changing due to innovate rapidly. Researchers have been developing new approaches for making information systems more secure, offering advanced security strategies, frameworks, models, and assessment methods. Most of those researches are focused on attacks from outside. This paper provides interactive simulation-based experiments to demonstrate the ability of the model to create insider behaviour profiles that accurately reflect the risks and mitigations involved in the insider threat problem, as well as the model’s efficiency. The MERIT project [5] was initiated as a proof of concept – to determine whether or not an effective interactive learning environment could be developed to teach executives, managers, technical employee, human resources, and security officers the complex dynamics of the insider threat problem.

Related work
Case Study
Simulation model
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call