scholarly journals A Multi-Tiered Framework for Insider Threat Prevention

Electronics ◽  
2021 ◽  
Vol 10 (9) ◽  
pp. 1005
Author(s):  
Rakan A. Alsowail ◽  
Taher Al-Shehari

As technologies are rapidly evolving and becoming a crucial part of our lives, security and privacy issues have been increasing significantly. Public and private organizations have highly confidential data, such as bank accounts, military and business secrets, etc. Currently, the competition between organizations is significantly higher than before, which triggers sensitive organizations to spend an excessive volume of their budget to keep their assets secured from potential threats. Insider threats are more dangerous than external ones, as insiders have a legitimate access to their organization’s assets. Thus, previous approaches focused on some individual factors to address insider threat problems (e.g., technical profiling), but a broader integrative perspective is needed. In this paper, we propose a unified framework that incorporates various factors of the insider threat context (technical, psychological, behavioral and cognitive). The framework is based on a multi-tiered approach that encompasses pre, in and post-countermeasures to address insider threats in an all-encompassing perspective. It considers multiple factors that surround the lifespan of insiders’ employment, from the pre-joining of insiders to an organization until after they leave. The framework is utilized on real-world insider threat cases. It is also compared with previous work to highlight how our framework extends and complements the existing frameworks. The real value of our framework is that it brings together the various aspects of insider threat problems based on real-world cases and relevant literature. This can therefore act as a platform for general understanding of insider threat problems, and pave the way to model a holistic insider threat prevention system.

Author(s):  
Ephraim Zimmer ◽  
Christian Burkert ◽  
Hannes Federrath

The insider threat is often cited as one of the most challenging threats for security practitioners. Even though this topic is receiving considerable attention, two main problems remain unsolved. First, research on insider threats is focusing on many different insiders without being able to actually identify and consistently entitle the key aspects of the insiders. As a result, this research can neither be identified by practitioners as being relevant for their real-world insider problems, nor can it be compared with other research targeting the same insider aspects. Second, a clear understanding of insiders is vital for analysing, which insider properties are responsible for the peculiarity of insider threats. In this paper, a systematic approach to dissect the defining aspects of insiders is proposed, which includes specific allocatable insider characteristics. Additionally, the insider characteristics are extended towards insider types, which establish universal and unambiguous names for different insiders, and which are related with each other to form a new and simple insider taxonomy. The new foundations on insiders allow the comparison of different insider research in a structured manner. Furthermore, the new approach facilitates the identification of specific features of insider threats in future work.


2015 ◽  
Vol 25 (61) ◽  
pp. 191-199 ◽  
Author(s):  
Cristiane Pimentel Nalin ◽  
Lucia Helena de Freitas Pinho França

The increase in the elderly population has prompted research on retirement. This study investigated the importance of resilience, economic satisfaction, the length of retirement, and planning to well-being during retirement of 270 participants. The majority of this sample were men (64%), and the mean age was 65 years (SD = 5.7). The participants were retired members of 10 public and private organizations in Rio de Janeiro. Factor analysis and hierarchical regression were performed. The results showed that determined resilience (mastery, adaptability, confidence and perseverance) and socioeconomic satisfaction were the main predictors of well-being in retirement and explained 28% of this model. The findings suggest that well-being in retirement is closely related to socioeconomic satisfaction and determined resilience. Additional research should address the importance of resilience for the well-being of retirees who are or not members of retirement associations. Resilience attitudes should be promoted in Retirement Education Programs.


2017 ◽  
Vol 17 (2) ◽  
pp. 197-214 ◽  
Author(s):  
James B Abugre

The purpose of this article was to investigate the concept of time and its management in relation to productivity. Consequently, this work employed phenomenological psychology to unearth the experiences of employees on the concept of time management and its impact on productivity using Ghana as a study. Participants involved both local and expatriate workers sharing their experiences on the subject matter in a conversational style. Results indicated that clock time is considered a flexible resource in both social and professional settings. Findings also revealed that time management drives productivity, and its orientation is consequential to the cultural behaviors of local employees in both public and private organizations based on the quality of their corporate cultures. Hence, rigid timelines can turn around public organizations in sub-Saharan Africa and the world as a whole.


Atlanti ◽  
2018 ◽  
Vol 28 (1) ◽  
pp. 229-237
Author(s):  
Andrei Rybakou

The article is devoted to the search for optimal solutions for building the relationship between public and private archives. The author acknowledges that the documents formed in the activities of private organizations have value and are subject to permanent storage for future generations. However, it is impossible to keep all the documentation, therefore, when selecting documents for permanent storage, it is necessary to take into account the principles and criteria for disposal developed by archival science, to apply them in a complex and creatively. When organizing work with private archives and accepting their documents in state archives, it is necessary to proceed from the property of the documents and, depending on the established legal relations and the value of documents of specific organizations, apply different approaches.


2013 ◽  
Vol 8 (1) ◽  
pp. 265-278 ◽  
Author(s):  
Carl Lagoze ◽  
William C. Block ◽  
Jeremy Williams ◽  
John Abowd ◽  
Lars Vilhuber

Social science researchers increasingly make use of data that is confidential because it contains linkages to the identities of people, corporations, etc. The value of this data lies in the ability to join the identifiable entities with external data, such as genome data, geospatial information, and the like. However, the confidentiality of this data is a barrier to its utility and curation, making it difficult to fulfil US federal data management mandates and interfering with basic scholarly practices, such as validation and reuse of existing results. We describe the complexity of the relationships among data that span a public and private divide. We then describe our work on the CED2AR prototype, a first step in providing researchers with a tool that spans this divide and makes it possible for them to search, access and cite such data.


2021 ◽  
Vol 5 (S1) ◽  
pp. 506-528
Author(s):  
Harvey G.O. Igben ◽  
Michael E. Ilaya

New media is a trending innovation and its influence in the promotion of mutual understanding between organizations and strategic publics is a more contemporary issue. This study evaluates the perception of public relations practitioners on the incorporation of new media into the process of promoting good relationships between organizations and strategic publics in Nigeria. The fundamental goal is to examine if public relations practitioners find new media helpful in carrying out public relations activities in their organizations. This study is hinged on Technological determinism theory.  Findings show that public relations practitioners of both public and private organizations do perceive the adoption of new media technologies in the performance of their function for the promotion of mutual understanding as supportive to quick and interactive approaches to dissemination of information from organizations to strategic stakeholders and the public. The study recommends that more public relations practitioners of organizations especially public organizations should be encouraged to use new media in course of executing their professional assignments.


Entropy ◽  
2021 ◽  
Vol 23 (10) ◽  
pp. 1258
Author(s):  
Taher Al-Shehari ◽  
Rakan A. Alsowail

Insider threats are malicious acts that can be carried out by an authorized employee within an organization. Insider threats represent a major cybersecurity challenge for private and public organizations, as an insider attack can cause extensive damage to organization assets much more than external attacks. Most existing approaches in the field of insider threat focused on detecting general insider attack scenarios. However, insider attacks can be carried out in different ways, and the most dangerous one is a data leakage attack that can be executed by a malicious insider before his/her leaving an organization. This paper proposes a machine learning-based model for detecting such serious insider threat incidents. The proposed model addresses the possible bias of detection results that can occur due to an inappropriate encoding process by employing the feature scaling and one-hot encoding techniques. Furthermore, the imbalance issue of the utilized dataset is also addressed utilizing the synthetic minority oversampling technique (SMOTE). Well known machine learning algorithms are employed to detect the most accurate classifier that can detect data leakage events executed by malicious insiders during the sensitive period before they leave an organization. We provide a proof of concept for our model by applying it on CMU-CERT Insider Threat Dataset and comparing its performance with the ground truth. The experimental results show that our model detects insider data leakage events with an AUC-ROC value of 0.99, outperforming the existing approaches that are validated on the same dataset. The proposed model provides effective methods to address possible bias and class imbalance issues for the aim of devising an effective insider data leakage detection system.


2021 ◽  
Vol 9 (1) ◽  
pp. 71-79
Author(s):  
Jacqualine Cristhy Ujil

The recent advancements in technologies have allowed us to come so far and resulted in many breakthroughs. One of the various examples is internet of things, wireless communication, and cloud computing which can be useful if utilize in many fields. In the field of medical, these advancements allowed any medical centres to improve patient’s health remotely simply by using wearable devices on patients that then will amalgamate with the wireless body area network (WBAN). However, WBAN has limited resources which limits its services. To solve this problem, cloud computing is used to provide storage and computation. Unfortunately, these methods allow the system to be vulnerable to various malicious attacks. Attackers can easily gain access to the medical records of patients hence the integrity of security and privacy of confidential data have been compromised. In this paper, we presented a secure protocol for cloud-assisted database using multi-factor authentication and blockchain as an added measure to ensure security. Accordingly, we prove that the presented scheme offers more security and privacy. Therefore, it is the most practical method to be applied in the medical field.


2018 ◽  
Vol 6 (1) ◽  
pp. 19-29 ◽  
Author(s):  
Jeffrey H. Altschul ◽  
Keith W. Kintigh ◽  
Terry H. Klein ◽  
William H. Doelle ◽  
Kelley A. Hays-Gilpin ◽  
...  

ABSTRACTWhile our fascination with understanding the past is sufficient to warrant an increased focus on synthesis, solutions to important problems facing modern society require understandings based on data that only archaeology can provide. Yet, even as we use public monies to collect ever-greater amounts of data, modes of research that can stimulate emergent understandings of human behavior have lagged behind. Consequently, a substantial amount of archaeological inference remains at the level of the individual project. We can more effectively leverage these data and advance our understandings of the past in ways that contribute to solutions to contemporary problems if we adapt the model pioneered by the National Center for Ecological Analysis and Synthesis to foster synthetic collaborative research in archaeology. We propose the creation of the Coalition for Archaeological Synthesis coordinated through a U.S.-based National Center for Archaeological Synthesis. The coalition will be composed of established public and private organizations that provide essential scholarly, cultural heritage, computational, educational, and public engagement infrastructure. The center would seek and administer funding to support collaborative analysis and synthesis projects executed through coalition partners. This innovative structure will enable the discipline to address key challenges facing society through evidentially based, collaborative synthetic research.


Sign in / Sign up

Export Citation Format

Share Document