A methodology and supporting techniques for the quantitative assessment of insider threats

  • Authors:
  • Nicola Nostro;Andrea Ceccarelli;Andrea Bondavalli;Francesco Brancati

  • Affiliations:
  • University of Firenze, Viale Morgagni, Firenze, Italy;University of Firenze, Viale Morgagni, Firenze, Italy;University of Firenze, Viale Morgagni, Firenze, Italy;Resiltech S.r.l., Piazza Nilde Iotti, Pontedera (Pisa), Italy

  • Venue:
  • Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security is a major challenge for today's companies, especially ICT ones which manages large scale cyber-critical systems. Amongst the multitude of attacks and threats to which a system is potentially exposed, there are insiders attackers i.e., users with legitimate access which abuse or misuse of their power, thus leading to unexpected security violation (e.g., acquire and disseminate sensitive information). These attacks are very difficult to detect and mitigate due to the nature of the attackers, which often are company's employees motivated by socio-economical reasons, and to the fact that attackers operate within their granted restrictions: it is a consequence that insiders attackers constitute an actual threat for ICT organizations. In this paper we present our ongoing work towards a methodology and supporting libraries and tools for insider threats assessment and mitigation. The ultimate objective is to quantitatively evaluate the possibility that a user will perform an attack, the severity of potential violations, the costs, and finally select the countermeasures. The methodology also includes a maintenance phase during which the assessment is updated on the basis of system evolution. The paper discusses future works towards the completion of our methodology.