Insider Threat
1,266 Followers
Recent papers in Insider Threat
Masqueraders are users who take control of a machine and perform malicious activities such as data exfiltration or system misuse on behalf of legitimate users. In the literature, there are various approaches for detecting masqueraders by... more
The purpose of this document is to provide guidance on safeguards that limit the introduction of malicious code into software and software systems in order to reduce the risk posed to software by malicious code. The intended audience for... more
Introduction Among the problems discussed in this study is the issue of national security, broadly defined. Recognizing the need for safe existence of citizens, it is impossible not to note that we live in an increasingly global world,... more
Robert Hanssen, a career FBI Special Agent and " trusted insider " , was able to sell U.S. secrets to the Soviets and Russians for twenty-two years before his detection in December, 2000 by the FBI. Prior to Hanssen's arrest, the FBI's... more
Deutsche Afghanistan-Soldaten sahen sich während der ISAF-Mission wie ihre alliierten Verbündeten neben offenen Angriffen durch Aufständische auch den Gefahren sogenannter Insider bzw. Innentäter ausgesetzt. Im Beitrag wird am Beispiel... more
The current consensus is that there is a worldwide gap in skills needed for a competent cybersecurity workforce. This skills gap has implications for the national security sector, both public and private. Although the view is that this... more
Insider threats are one of today's most challenging cybersecurity issues that are not well addressed by commonly employed security solutions. In this work we propose structural taxonomy and novel categorization of research that contribute... more
This is a report submitted to the International Atomic Energy Agency (IAEA) under the IAEA-UGA (University of Georgia in Athens) Agreement on Coordinated Research Projects for Enhancement of Nuclear Security Culture. CITS/UGA staff and... more
Among the problems discussed in this study is the issue of national security, broadly defined. Recognizing the need for safe existence of citizens, it is impossible not to note that we live in an increasingly global world, so discussion... more
The IAEA International Standards for Tissue Banks published in 2003 were based on the Standards then currently in use in the USA and the European Union, among others, and reflect the best practices associated with the operation of a... more
Mass violence is empirically rare. Studying mass violence presents numerous meth-odological challenges. The complex nature of mass violence events, which may have germinated in years prior, make attempts to use conventional research... more
This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have been implemented the algorithm in a program and... more
Insider threat has become a serious issue to the many organizations. Various companies are increasingly deploying many information technologies to prevent unauthorized access to getting inside their system. Biometrics approaches have some... more
Collaborative Information Systems (CIS) allow users to belong to different groups to communicate and interfere with shared tasks or documents for collaboration. Current Intrusion Detection Systems are not effective in detecting insider... more
Information systems face several security threats, some of which originate by insiders. This paper presents a novel, interdisciplinary insider threat prediction model. It combines approaches, techniques, and tools from computer science... more
In this paper we present the TWOS dataset that contains realistic instances of insider threats based on a gamified competition. The competition simulated user interactions in/among competing companies, where two types of behaviors (normal... more
According to Transparency International, Australia is perceived to be one of the least corrupt countries in the world, although Australia's ranking in the latest Corruption Perceptions Index (Transparency International 2018) has recently... more
Insider Threat program approached for industry and government. Discussions on how to approach security from a 21st Century perspective
Insider’s malicious information security behaviours have always been a persistent problem and requiring urgent mitigation solutions. More recently, seminal calls for future research suggested exploring the influences of employee-workplace... more
There is little literature examining the impact of non-crypto focused quantum computation threats such as maximum quasi clique, minimum clique cover, portfolio, risk optimization, asset degradation, and utility system distribution... more
Abstract Purpose The purpose of this paper is to demonstrate how document protection has become a key object of concern for organizations, how the threat of leaks has led to an increase in security technologies and policies and how these... more
Durante los últimos años han proliferado en el mercado tecnológico soluciones relacionadas con la detección del fraude a través de sistemas de inteligencia artificial basada en explotación de datos masiva (Big Data). La detección de... more
According to Transparency International, Australia is perceived to be one of the least corrupt countries in the world, although Australia’s ranking in the latest Corruption Perceptions Index (Transparency International 2018) has recently... more
THE IMPORTANCE OF PROTECTING NUCLEAR POWER plants, laboratories, and other facilities can hardly be overstated, especially in light of increased threats of terrorism. But the two principal components of nu-clear facility securitythe... more
Among the problems discussed in this study is the issue of national security, broadly defined. Recognizing the need for safe existence of citizens, it is impossible not to note that we live in an increasingly global world, so discussion... more
Book Details: Book Title: Computer Security & Risk Analysis Publisher: Independent Publishing, 2018 ISBN-13: 978-1731512895 ISBN-10: 1731512899 EAN: 9781731512895 Book language: English By (author) : Dileep Keshava Narayana Number of... more
Background/ Explanation of Issues: Joint Publication 1-02 states deterrence “prevents adversary action through the presentation of a credible threat of unacceptable counteraction and belief that the cost of the action outweighs the... more
A discussion on Insider Threat policies being developed by the federal government and industry's role in implementation.
This innovative approach narrates one of the crises of the late Hashemite monarchy from Wien. The Austrian capital (still under Soviet military occupation) took an unexpectedly-prominent role as the setting for both Iraq's centrist and... more