Academic literature on the topic 'Insider threat'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Insider threat.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Insider threat"
Alsowail, Rakan A., and Taher Al-Shehari. "A Multi-Tiered Framework for Insider Threat Prevention." Electronics 10, no. 9 (April 22, 2021): 1005. http://dx.doi.org/10.3390/electronics10091005.
Full textMohammad, Nur Ameera Natasha, Warusia Mohamed Yassin, Rabiah Ahmad, Aslinda Hassan, and Mohammed Nasser Ahmed Al Mhiqani. "An Insider Threat Categorization Framework for Automated Manufacturing Execution System." International Journal of Innovation in Enterprise System 3, no. 02 (July 31, 2019): 31–41. http://dx.doi.org/10.25124/ijies.v3i02.38.
Full textHu, Teng, Bangzhou Xin, Xiaolei Liu, Ting Chen, Kangyi Ding, and Xiaosong Zhang. "Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats." Sensors 20, no. 18 (September 16, 2020): 5297. http://dx.doi.org/10.3390/s20185297.
Full textAl-Mhiqani, Mohammed Nasser, Rabiah Ahmad, Z. Zainal Abidin, Warusia Yassin, Aslinda Hassan, Karrar Hameed Abdulkareem, Nabeel Salih Ali, and Zahri Yunos. "A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations." Applied Sciences 10, no. 15 (July 28, 2020): 5208. http://dx.doi.org/10.3390/app10155208.
Full textNasser Al-mhiqani, Mohammed, Rabiah Ahmad, Zaheera Zainal Abidin, Warusia Yassin, Aslinda Hassan, and Ameera Natasha Mohammad. "New insider threat detection method based on recurrent neural networks." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 3 (March 1, 2020): 1474. http://dx.doi.org/10.11591/ijeecs.v17.i3.pp1474-1479.
Full textAdikari, Swini. "Countering the Threat of Nuclear Terrorism Arising from Malicious Insiders." Global Affairs Review 1, no. 2 (June 15, 2021): 1–18. http://dx.doi.org/10.51330/gar.0020214.
Full textKim, Park, Kim, Cho, and Kang. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences 9, no. 19 (September 25, 2019): 4018. http://dx.doi.org/10.3390/app9194018.
Full textSoleh, Musdi Muhammad. "A Study Case in NTMC POLRI: Reducing Data Breach Risk from Insider Threats by Using Risk IT Framework." ACMIT Proceedings 3, no. 1 (March 18, 2019): 171–79. http://dx.doi.org/10.33555/acmit.v3i1.41.
Full textYilmaz, Erhan, and Ozgu Can. "Unveiling Shadows: Harnessing Artificial Intelligence for Insider Threat Detection." Engineering, Technology & Applied Science Research 14, no. 2 (April 2, 2024): 13341–46. http://dx.doi.org/10.48084/etasr.6911.
Full textKim, Jung Hwan, Chul Min Kim, and Man-Sung Yim. "An Investigation of Insider Threat Mitigation Based on EEG Signal Classification." Sensors 20, no. 21 (November 8, 2020): 6365. http://dx.doi.org/10.3390/s20216365.
Full textDissertations / Theses on the topic "Insider threat"
Munshi, Asmaa Mahdi. "A study of insider threat behaviour: developing a holistic insider threat model." Thesis, Curtin University, 2013. http://hdl.handle.net/20.500.11937/1668.
Full textBlack, Alan. "Managing the aviation insider threat." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5039.
Full textApproved for public release; distribution is unlimited
Despite enhancements to aviation security since September 11, 2001, there remain vulnerabilities from employees at airports. This threat results from airline/airport employees that have access to sensitive and restricted areas during the normal course of their required duties. This thesis evaluates the threat and the measures in place to prevent attacks from aviation insiders. In addition, it evaluates a measure commonly referred to as 100 percent employee screening. Finally, the thesis derives recommendations to enhance the current methods to reduce the vulnerability, as well as proposes additional measures to further reduce the threat from aviation insiders.
Schluderberg, Larry E. "Addressing the cybersecurity Malicious Insider threat." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1571095.
Full textMalicious Insider threats consist of employees, contractors, or business partners who either have current authorized access, or have had authorized access to an organization's critical information and have intentionally misused that access in a manner that compromised the organization. Although incidents initiated by malicious insiders are fewer in number than those initiated by external threats, insider incidents are more costly on average because the threat is already trusted by the organization and often has privileged access to the organization's most sensitive information. In spite of the damage they cause there are indications that the seriousness of insider incidents are underappreciated as threats by management. The purpose of this research was to investigate who constitutes MI threats, why and how they initiate attacks, the extent to which MI activity can be modeled or predicted, and to suggest some risk mitigation strategies. The results reveal that addressing the Malicious Insider threat is much more than just a technical issue. Dealing effectively with the threat involves managing the dynamic interaction between employees, their work environment and work associates, the systems with which they interact, and organizational policies and procedures. Techniques for detecting and mitigating the threat are available and can be effectively applied. Some of the procedural and technical methods include definition of, follow through, and consistent application of corporate, and dealing with adverse events indigenous to the business environment. Other methods include conduct of a comprehensive Malicious Insider risk assessment, selective monitoring of employees in response to behavioral precursors, minimizing unknown access paths, control of the organization's production software baseline, and effective use of peer reporting.
Keywords: Cybersecurity, Professor Paul Pantani, CERT, insider, threat, IDS, SIEMS. FIM, RBAC, ABAC, behavioral, peer, precursors, access, authentication, predictive, analytics, system, dynamics, demographics.
McKinney, Steven. "Insider Threat: User Identification Via Process Profiling." NCSU, 2008. http://www.lib.ncsu.edu/theses/available/etd-05092008-154325/.
Full textMagklaras, Georgios Vasilios. "An insider misuse threat detection and prediction language." Thesis, University of Plymouth, 2012. http://hdl.handle.net/10026.1/1024.
Full textRocha, Francisco. "Insider threat : memory confidentiality and integrity in the cloud." Thesis, University of Newcastle upon Tyne, 2015. http://hdl.handle.net/10443/2960.
Full textElmrabit, Nebrase. "A multiple-perspective approach for insider-threat risk prediction in cyber-security." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/36243.
Full textCallahan, Christopher J. "Security information and event management tools and insider threat detection." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37596.
Full textMalicious insider activities on military networks can pose a threat to military operations. Early identification of malicious insiders assists in preventing significant damage and reduces the overall insider threat to military networks. Security Information and Event Management (SIEM) tools can be used to identify potential malicious insider activities. SIEM tools provide the ability to normalize and correlate log data from multiple sources on networks. Personnel background investigations and administrative action information can provide data sources for SIEM tools in order to assist in early identification of the insider threat by correlating this information with the individuals online activities. This thesis provides background information on the components and functionality of SIEM tools, summarizes historic insider threat cases to determine common motivations, provides an overview of military security investigations and administrative actions in order to determine candidate sources for SIEM correlation, and provides an overview of common methods of data exfiltration by malicious insiders. This information is then used to develop an example SIEM architecture that highlights how the military can use a SIEM to identify and prevent potential internal insider threats by correlating an individuals network activities with background investigation and administrative action information.
Jenkins, Jeffrey Lyne. "Alleviating Insider Threats: Mitigation Strategies and Detection Techniques." Diss., The University of Arizona, 2013. http://hdl.handle.net/10150/297023.
Full textHashem, Yassir. "Multi-Modal Insider Threat Detection and Prevention based on Users' Behaviors." Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc1248460/.
Full textBooks on the topic "Insider threat"
Godse, Vinayak. The threat within: A study on insider threat by DSCI in collaboration with PwC. New Delhi: Data Security Council of India, 2011.
Find full text1954-, Hoffman Bruce, United States. Dept. of Energy., and Rand Corporation, eds. Insider crime: The threat to nuclear facilities and programs. Santa Monica, CA: Rand Corp., 1990.
Find full text1939-, Anderson Robert H., United States. Advanced Research and Development Activity, and Rand Corporation, eds. Understanding the insider threat: Proceedings of a March 2004 workshop. Santa Monica, CA: RAND, 2004.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. Examining insider threat risk at the U.S.Citizenship and Immigration Services. Washington, DC: U.S. Dept. of Homeland Security, Office of Inspector General, 2011.
Find full textInsider threat: A guide to understanding, detecting, and defending against the enemy from within. Ely, Cambridgeshire, United Kingdom: IT Governance Publishing, 2016.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. Transportation Security Administration has taken steps to address the insider threat but challenges remain (redacted). Washington, DC: Department of Homeland Security, Office of Inspector General, 2012.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. U.S. Customs and Border Protection has taken steps to address insider threat, but challenges remain (redacted). Washington, DC: Department of Homeland Security, Office of Inspector General, 2013.
Find full textCarneiro, Anabela. Market power, dismissal threat and rent sharing: The role of insider and outsider forces in wage bargaining. Bonn, Germany: IZA, 2006.
Find full textOcasio, William. Failure-induced change and threat-rigidity under economic adversity: The case of insider vs. outsider CEO succession. Cambridge, Mass: Alfred P. Sloan School of Management, Massachusetts Institute of Technology, 1993.
Find full textBook chapters on the topic "Insider threat"
Bore, James. "Insider Threat." In Advanced Sciences and Technologies for Security Applications, 431–50. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-35746-7_19.
Full textWilliams, Adam D., Shannon N. Abbott, and Adriane C. Littlefield. "Insider Threat." In Encyclopedia of Security and Emergency Management, 1–8. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_156-1.
Full textWilliams, Adam D., Shannon N. Abbott, and Adriane C. Littlefield. "Insider Threat." In Encyclopedia of Security and Emergency Management, 1–8. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_156-2.
Full textBishop, Matt. "Insider Threat." In Encyclopedia of Cryptography, Security and Privacy, 1–4. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1586-1.
Full textWilliams, Adam D., Shannon N. Abbott, and Adriane C. Littlefield. "Insider Threat." In Encyclopedia of Security and Emergency Management, 450–57. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_156.
Full textSims, Shane. "Insider Threat Investigations." In Springer’s Forensic Laboratory Science Series, 45–51. Totowa, NJ: Humana Press, 2010. http://dx.doi.org/10.1007/978-1-60761-772-3_4.
Full textAyala, Luis. "Hospital Insider Threat." In Cybersecurity for Hospitals and Healthcare Facilities, 47–51. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2155-6_5.
Full textStolfo, Salvatore J., Brian M. Bowen, and Malek Ben Salem. "Insider Threat Defense." In Encyclopedia of Cryptography and Security, 609–11. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_904.
Full textTagg, Gary L. "The Insider Threat." In Computer Security Handbook, 13.1–13.12. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch13.
Full textMoallem, Abbas. "Insider Threat Protection." In Understanding Cybersecurity Technologies, 135–42. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003038429-14.
Full textConference papers on the topic "Insider threat"
Ho, Shuyuan Mary, Hengyi Fu, Shashanka S. Timmarajus, Cheryl Booth, Jung Hoon Baeg, and Muye Liu. "Insider Threat." In SIGMIS-CPR '15: 2015 Computers and People Research Conference. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2751957.2751978.
Full textBishop, Matt, Kara Nance, and Jason Clark. "Introduction to Inside the Insider Threat Minitrack." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2017. http://dx.doi.org/10.24251/hicss.2017.318.
Full textBishop, Matt, Kara Nance, and William Claycomb. "Introduction to the Inside the Insider Threat Minitrack." In 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE, 2016. http://dx.doi.org/10.1109/hicss.2016.342.
Full textBishop, Matt, and Carrie Gates. "Defining the insider threat." In the 4th annual workshop. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1413140.1413158.
Full textCastiglione, Aniello, Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, and Raffaele Pizzolante. "Novel Insider Threat Techniques." In CCS'15: The 22nd ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2808783.2808789.
Full textMundie, David A., Sam Perl, and Carly L. Huth. "Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions." In 2013 3rd International Workshop on Socio-Technical Aspects in Security and Trust (STAST). IEEE, 2013. http://dx.doi.org/10.1109/stast.2013.14.
Full textClark, Jason, Matt Bishop, and Frank Greitzer. "Introduction to the Minitrack on Inside the Insider Threat." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2020. http://dx.doi.org/10.24251/hicss.2020.272.
Full textYoung, William T., Alex Memory, Henry G. Goldberg, and Ted E. Senator. "Detecting Unknown Insider Threat Scenarios." In 2014 IEEE Security and Privacy Workshops (SPW). IEEE, 2014. http://dx.doi.org/10.1109/spw.2014.42.
Full textGoldberg, Henry, William Young, Matthew Reardon, Brian Phillips, and Ted Senator. "Insider Threat Detection in PRODIGAL." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2017. http://dx.doi.org/10.24251/hicss.2017.320.
Full textMontelibano, Joji, and Andrew Moore. "Insider Threat Security Reference Architecture." In 2012 45th Hawaii International Conference on System Sciences (HICSS). IEEE, 2012. http://dx.doi.org/10.1109/hicss.2012.327.
Full textReports on the topic "Insider threat"
CALIFORNIA UNIV LOS ANGELES. DoD Insider Threat Mitigation. Fort Belvoir, VA: Defense Technical Information Center, January 1999. http://dx.doi.org/10.21236/ada385423.
Full textMontelibano, Joji, and Andrew Moore. Insider Threat Security Reference Architecture. Fort Belvoir, VA: Defense Technical Information Center, April 2012. http://dx.doi.org/10.21236/ada609926.
Full textWong, F. Insider Threat Symposium Curated Questions. Office of Scientific and Technical Information (OSTI), February 2019. http://dx.doi.org/10.2172/1548366.
Full textMaxion, R. A., K. M. Tan, S. S. Killourhy, and T. N. Townsend. Profiler-2000: Attacking the Insider Threat. Fort Belvoir, VA: Defense Technical Information Center, September 2005. http://dx.doi.org/10.21236/ada439600.
Full textGibbs, Philip, Robert Larsen, Mike O'Brien, and Jose Rodriquez. Insider Threat Mitigation Workshop Instructional Materials. Office of Scientific and Technical Information (OSTI), January 2008. http://dx.doi.org/10.2172/1170579.
Full textShevenell, Michael John. A Scalable HPC Insider Threat Monitoring System. Office of Scientific and Technical Information (OSTI), March 2018. http://dx.doi.org/10.2172/1489161.
Full textGibbs, Philip, Robert Larsen, Mike O'Brien, and Tom Edmunds. Advanced Insider Threat Mitigation Workshop Instructional Materials. Office of Scientific and Technical Information (OSTI), February 2009. http://dx.doi.org/10.2172/1167146.
Full textGibbs, Philip, Robert Larsen, Mike O Brien, and Tom Edmunds. Advanced insider threat mitigation workshop instructional materials. Office of Scientific and Technical Information (OSTI), November 2008. http://dx.doi.org/10.2172/1167421.
Full textHanley, Michael, and Joji Montelibano. Insider Threat Control: Using Centralized Logging to Detect Data Exfiltration Near Insider Termination. Fort Belvoir, VA: Defense Technical Information Center, October 2011. http://dx.doi.org/10.21236/ada610463.
Full textPope, Noah Gale, Martha Williams, Joel Lewis, and Thomas Pham. Taking Steps to Protect Against the Insider Threat. Office of Scientific and Technical Information (OSTI), October 2015. http://dx.doi.org/10.2172/1223757.
Full text