Addressing the Insider Threat
暂无分享,去创建一个
In their guest editors' introduction to the special issue on Insider Threat, Shari Lawrence Pfleeger and Salvatore Stolfo describe a taxonomy of insiders and their unwelcome actions, as well as the need for credible data to document the size and nature of the insider threat. They suggest that the three articles in the special issue shed light not only on how to generate data for further study but also on how to use the data in models that can help evaluate the likely effects of various responses. The introduction ends with a matrix showing the variety of sensible and effective responses that must be sensitive to the organizations, systems, environments, and individuals involved with inappropriate insider behavior.
[1] Dawn M. Cappelli,et al. Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors , 2005 .
[2] Robert H. Anderson,et al. Understanding the Insider Threat: Proceedings of a March 2004 Workshop , 2005 .
[3] Thomas Bozek,et al. Research on Mitigating the Insider Threat to Information Systems - #2 , 2000 .
[4] Shari Lawrence Pfleeger,et al. Insiders Behaving Badly , 2008, IEEE Security & Privacy.