Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
Using Text Categorization Techniques for Intrusion Detection
Proceedings of the 11th USENIX Security Symposium
A Sense of Self for Unix Processes
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Honeypots: Catching the Insider Threat
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
A social learning theory and moral disengagement analysis of criminal computer behavior: an exploratory study
Employees' privacy vs. employers' security: can they be balanced?
Telematics and Informatics - Special issue: Developing a culture of privacy in the global village
Intrusion detection using sequences of system calls
Journal of Computer Security
Detecting Insider Theft of Trade Secrets
IEEE Security and Privacy
Building A System For Insider Security
IEEE Security and Privacy
Designing Host and Network Sensors to Mitigate the Insider Threat
IEEE Security and Privacy
Guest editorial: A brief overview of data leakage and insider threats
Information Systems Frontiers
Proactive insider threat detection through social media: the YouTube case
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Hi-index | 0.00 |
Information systems face several security threats, some of which originate by insiders. This paper presents a novel, interdisciplinary insider threat prediction model. It combines approaches, techniques, and tools from computer science and psychology. It utilizes real time monitoring, capturing the user's technological trait in an information system and analyzing it for misbehavior. In parallel, the model is using data from psychometric tests, so as to assess for each user the predisposition to malicious acts and the stress level, which is an enabler for the user to overcome his moral inhibitions, under the condition that the collection of such data complies with the legal framework. The model combines the above mentioned information, categorizes users, and identifies those that require additional monitoring, as they can potentially be dangerous for the information system and the organization.