Mitigating Insider Threats by Active Detection

Provided by: American V-King Scientific Publishing
Topic: Security
Format: PDF
Traditional security measures have been developed to protect computer systems and data mainly against outside attacks. However, insider threats have potential to inflict severe damage to the organization's resources, financial assets, and reputation. Among various types of insider threats, which may break confidentiality, integrity, or availability, this paper is focused on the violations of confidentiality by privilege misuse or escalation in sensitive applications. First, the authors analyze and identify insider-threat scenarios that compromise confidentiality. They then discuss how to detect each threat scenario by analyzing the primitive user activities.

Find By Topic