Insiders behaving badly: addressing bad actors and their actions

  • Authors:
  • Shari Lawrence Pfleeger;Joel B. Predd;Jeffrey Hunker;Carla Bulford

  • Affiliations:
  • RAND Corporation, Arlington, VA;RAND Corporation, Arlington, VA;Jeffrey Hunker Associates, Pittsburgh, PA;Jeffrey Hunker Associates, Pittsburgh, PA

  • Venue:
  • IEEE Transactions on Information Forensics and Security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present a framework for describing insiders and their actions based on the organization, the environment, the system, and the individual. Using several real examples of unwelcome insider action (hard drive removal, stolen intellectual property, tax fraud, and proliferation of e-mail responses), we show how the taxonomy helps in understanding how each situation arose and could have been addressed. The differentiation among types of threats suggests how effective responses to insider threats might be shaped, what choices exist for each type of threat, and the implications of each. Future work will consider appropriate strategies to address each type of insider threat in terms of detection, prevention, mitigation, remediation, and punishment.