American V-King Scientific Publishing
Traditional security measures have been developed to protect computer systems and data mainly against outside attacks. However, insider threats have potential to inflict severe damage to the organization's resources, financial assets, and reputation. Among various types of insider threats, which may break confidentiality, integrity, or availability, this paper is focused on the violations of confidentiality by privilege misuse or escalation in sensitive applications. First, the authors analyze and identify insider-threat scenarios that compromise confidentiality. They then discuss how to detect each threat scenario by analyzing the primitive user activities.