The Insider Threat: Reasons, Effects and Mitigation Techniques | Proceedings of the 24th Pan-Hellenic Conference on Informatics (2024)

research-article

Authors: Dimitrios Tsiostas, George Kittes, Nestoras Chouliaras, Ioanna Kantzavelou, + 3, Leandros Maglaras, Christos Douligeris, Vasileios Vlachos (Less)

PCI '20: Proceedings of the 24th Pan-Hellenic Conference on Informatics

Pages 340 - 345

Published: 04 March 2021 Publication History

Metrics

Total Citations5Total Downloads398

Last 12 Months79

Last 6 weeks5

New Citation Alert added!

This alert has been successfully added and will be sent to:

You will be notified whenever a record that you have chosen has been cited.

To manage your alert preferences, click on the button below.

Manage my Alerts

New Citation Alert!

Please log in to your account

Get Access

    • Get Access
    • References
    • Media
    • Tables
    • Share

Abstract

The insider threat is increasingly becoming extremely important for companies, organizations and even governments. A malicious, or even a careless, insider can cause severe damage to the resources and the reputation of an organization. In this article, we provide an overview of the basic characteristics of insider cyber-security threats and we present current approaches and controls of mitigating such threats.

References

[1]

2020. Cost of Insider Threats Global Report: Proofpoint US. https://www.proofpoint.com/us/resources/threat-reports/2020-cost-of-insider-threats

[2]

Aliyu Aliyu, Leandros Maglaras, Ying He, Iryna Yevseyeva, Eerke Boiten, Allan Cook, and Helge Janicke. 2020. A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom. Applied Sciences 10, 10 (2020), 3660.

[3]

Alex Asen, Walter Bohmayr, Stefan Deutscher, Marcial González, and David Mkrtchian. 2019. Are you spending enough on cybersecurity?Technical Report. tech. rep., Boston Consulting Group.

[4]

StephenR Band, DawnM Cappelli, LynnF Fischer, AndrewP Moore, EricD Shaw, and RandallF Trzeciak. 2006. Comparing insider IT sabotage and espionage: A model-based analysis. Technical Report. CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST.

[5]

Guy Bunker. 2020. Targeted cyber attacks: how to mitigate the increasing risk. Network Security 2020, 1 (2020), 17–19.

Digital Library

[6]

Georgeta Catescu. 2018. Detecting insider threats using Security Information and Event Management (SIEM). Ph.D. Dissertation. UAS Technikum Wien.

[7]

Shekha Chenthara, Khandakar Ahmed, Hua Wang, and Frank Whittaker. 2019. Security and privacy-preserving challenges of e-health solutions in cloud computing. IEEE access 7(2019), 74361–74382.

[8]

[8] Daniel Costa.2017. https://insights.sei.cmu.edu/insider-threat/2017/03/cert-definition-of-insider-threat---updated.html

[9]

Harry Doubleday, Leandros Maglaras, and Helge Janicke. 2016. SSH honeypot: building, deploying and analysis. (2016).

[10]

Nebrase Elmrabit. 2018. A multiple-perspective approach for insider-threat risk prediction in cyber-security. Ph.D. Dissertation. Loughborough University.

[11]

Nebrase Elmrabit, Shuang-Hua Yang, and Lili Yang. 2015. Insider threats in information security categories and approaches. In 2015 21st International Conference on Automation and Computing (ICAC). IEEE, 1–6.

[12]

Mark Evans, Ying He, Leandros Maglaras, and Helge Janicke. 2019. HEART-IS: A novel technique for evaluating human error-related information security incidents. Computers & Security 80(2019), 74–89.

[13]

Bil Hallaq, Andrew Nicholson, Richard Smith, Leandros Maglaras, Helge Janicke, and Kevin Jones. 2018. CYRAN: a hybrid cyber range for testing security on ICS/SCADA systems. In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications. IGI Global, 622–637.

[14]

Ioanna Kantzavelou, PanagiotisF Tzikopoulos, and SokratisK Katsikas. 2013. Detecting intrusive activities from insiders in a wireless sensor network using game theory. In Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments. 1–8.

Digital Library

[15]

Leandros Maglaras, MohamedAmine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, and Helge Janicke. 2019. Cyber security: From regulations and policies to practice. In Strategic innovative marketing and tourism. Springer, 763–770.

[16]

LeandrosA Maglaras and Jianmin Jiang. 2014. A real time OCSVM intrusion detection module with low overhead for SCADA systems. International Journal of Advanced Research in Artificial Intelligence (IJARAI) 3, 10(2014).

[17]

Guerrino Mazzarolo and AncaDelia Jurcut. 2019. Insider threats in Cyber Security: The enemy within the gates. arXiv preprint arXiv:1911.09575(2019).

[18]

B Obama. 2012. National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs. Office of the Press Secretary(2012), 1.

[19]

Fatima Salahdine and Naima Kaabouch. 2019. Social engineering attacks: A survey. Future Internet 11, 4 (2019), 89.

[20]

CarolynnP Scherer and ChristyE Ruggiero. 2019. Overview of Tools for Insider Threat: Analysis and Mitigation. Technical Report. Los Alamos National Lab.(LANL), Los Alamos, NM (United States).

[21]

DavidS Wall. 2013. Enemies within: Redefining the insider threat in organizational security policy. Security journal 26, 2 (2013), 107–124.

Cited By

View all

  • Baugher JQu Y(2024)Create the Taxonomy for Unintentional Insider Threat via Text Mining and Hierarchical Clustering AnalysisEuropean Journal of Electrical Engineering and Computer Science10.24018/ejece.2024.8.2.6088:2(36-49)Online publication date: 5-Apr-2024
  • Silaen KMeyliana MWarnars HPrabowo HHidayanto AAnggreainy M(2023)Usefulness of Honeypots Towards Data Security: A Systematic Literature Review2023 International Workshop on Artificial Intelligence and Image Processing (IWAIIP)10.1109/IWAIIP58158.2023.10462777(422-427)Online publication date: 1-Dec-2023
  • Oruma SSánchez-Gordón MColomo-Palacios RGkioulos VHansen J(2022)A Systematic Review on Social Robots in Public Spaces: Threat Landscape and Attack SurfaceComputers10.3390/computers1112018111:12(181)Online publication date: 8-Dec-2022
  • Show More Cited By

Recommendations

  • Insider Threats: It's the HUMAN, Stupid!

    NCS '19: Proceedings of the Northwest Cybersecurity Symposium

    Insider threats refer to threats posed by individuals who intentionally or unintentionally destroy, exfiltrate, or leak sensitive information, or expose their organization to outside attacks. Surveys of organizations in government and industry ...

    Read More

  • Insider Threat Mitigation Using Moving Target Defense and Deception

    MIST '17: Proceedings of the 2017 International Workshop on Managing Insider Security Threats

    The insider threat has been subject of extensive study and many approaches from technical perspective to behavioral perspective and psychological perspective have been proposed to detect or mitigate it. However, it still remains one of the most ...

    Read More

  • Towards Countermeasure of Insider Threat in Network Security

    INCOS '11: Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems

    We discuss countermeasure against insider threats in network security aspect. In the context of countermeasure against insider threats, there is no perimeter for access control in a network. A traditional access control process by using a firewall on a ...

    Read More

Comments

Information & Contributors

Information

Published In

The Insider Threat: Reasons, Effects and Mitigation Techniques | Proceedings of the 24th Pan-Hellenic Conference on Informatics (8)

PCI '20: Proceedings of the 24th Pan-Hellenic Conference on Informatics

November 2020

433 pages

ISBN:9781450388979

DOI:10.1145/3437120

  • Editors:
  • Nikitas N. Karanikolas,
  • Athanasios Voulodimos,
  • Cleo Sgouropoulou,
  • Mara Nikolaidou,
  • Stefanos Gritzalis

Copyright © 2020 ACM.

Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [emailprotected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 March 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cybersecurity
  2. Insider threat
  3. Mitigation

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

PCI 2020

PCI 2020: 24th Pan-Hellenic Conference on Informatics

November 20 - 22, 2020

Athens, Greece

Acceptance Rates

Overall Acceptance Rate 190 of 390 submissions, 49%

Contributors

The Insider Threat: Reasons, Effects and Mitigation Techniques | Proceedings of the 24th Pan-Hellenic Conference on Informatics (14)

Other Metrics

View Article Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 5

    Total Citations

    View Citations
  • 398

    Total Downloads

  • Downloads (Last 12 months)79
  • Downloads (Last 6 weeks)5

Reflects downloads up to 29 Aug 2024

Other Metrics

View Author Metrics

Citations

Cited By

View all

  • Baugher JQu Y(2024)Create the Taxonomy for Unintentional Insider Threat via Text Mining and Hierarchical Clustering AnalysisEuropean Journal of Electrical Engineering and Computer Science10.24018/ejece.2024.8.2.6088:2(36-49)Online publication date: 5-Apr-2024
  • Silaen KMeyliana MWarnars HPrabowo HHidayanto AAnggreainy M(2023)Usefulness of Honeypots Towards Data Security: A Systematic Literature Review2023 International Workshop on Artificial Intelligence and Image Processing (IWAIIP)10.1109/IWAIIP58158.2023.10462777(422-427)Online publication date: 1-Dec-2023
  • Oruma SSánchez-Gordón MColomo-Palacios RGkioulos VHansen J(2022)A Systematic Review on Social Robots in Public Spaces: Threat Landscape and Attack SurfaceComputers10.3390/computers1112018111:12(181)Online publication date: 8-Dec-2022
  • Hamilton LRauch M(2022)The oil and gas cybersecurity enigmaThe Leading Edge10.1190/tle41090641.141:9(641-646)Online publication date: Sep-2022
  • Kern SBaumer TGroll SFuchs LPernul G(2022)Optimization of Access Control PoliciesJournal of Information Security and Applications10.1016/j.jisa.2022.10330170:COnline publication date: 1-Nov-2022

    https://dl.acm.org/doi/10.1016/j.jisa.2022.103301

View Options

Get Access

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

Get this Publication

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

The Insider Threat: Reasons, Effects and Mitigation Techniques | Proceedings of the 24th Pan-Hellenic Conference on Informatics (2024)

References

Top Articles
Eat Clean Chocolate Recipes for Valentines Day
Twice Baked Sweet Potatoes With Eggs Recipe
Muk Chalinee
Bg3 Fake Portrait Of A Noble Before His Death
Random Animal Hybrid Generator Wheel
Best Taq 56 Loadout Mw2 Ranked
Adventhealth Employee Hub Login
Cristiano Ronaldo's Jersey Number: The Story Behind His No. 7 Shirt | Football News
Schuylkill County Firewire
manhattan cars & trucks - by owner - craigslist
Wac 182
North Colonie Continuing Education
University Of Michigan Paging System
عکس کون زنان ایرانی
Forest | Definition, Ecology, Types, Trees, Examples, & Facts
Dominion Post Obituaries Morgantown
Pay Vgli
Hope for recovery emerges for a Ukrainian soldier who suffered a severe brain injury 2 years ago
Aldine Isd Pay Scale 23-24
Realidades 2 Workbook Answer Key
Olecranon Fractures Flower Mound
Fastest Lovakengj Favour
Bfri Forum
Walgreens Pharmacy On Jennings Station Road
NFL Week 1 games today: schedule, channels, live streams for September 8 | Digital Trends
Maven 5X30 Scope
Marukai Honolulu Weekly Ads
Roxplayhouse
Footfetish Telegram
University Of Arkansas Grantham Student Portal
Mrballen Political Views
Nenas Spa San Salvador
TV tablå Alla TV-program idag | Snabb och enkel tv-guide
Prot Pally Wrath Pre Patch
Everstart Maxx Jump Starter 1200 Manual
Hinterlands Landmarks
Closest Dollar Tree Store To My Location
Re/Max Houses For Sale
Whitfield County Jail Inmates P2C
Briggs And Stratton 125Cc Lawn Mower
Wiki Jfk Film
How Much Does Costco Gas Cost Today? Snapshot of Prices Across the U.S. | CostContessa
Hyb Urban Dictionary
Johnnie Robinson Auto Sales
Mathews Vertix Mod Chart
Cibo Tx International Kitchen Schertz Menu
Skagit.craigslist
World of Warcraft Battle for Azeroth: La Última Expansión de la Saga - EjemplosWeb
"Wordle" #1,176 answer, clues and hints for Saturday, September 7 game
Birmingham National Weather Service
Level A Sarasota
Immobiliare di Felice| Appartamento | Appartamento in vendita Porto San
Latest Posts
Article information

Author: Foster Heidenreich CPA

Last Updated:

Views: 5873

Rating: 4.6 / 5 (76 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Foster Heidenreich CPA

Birthday: 1995-01-14

Address: 55021 Usha Garden, North Larisa, DE 19209

Phone: +6812240846623

Job: Corporate Healthcare Strategist

Hobby: Singing, Listening to music, Rafting, LARPing, Gardening, Quilting, Rappelling

Introduction: My name is Foster Heidenreich CPA, I am a delightful, quaint, glorious, quaint, faithful, enchanting, fine person who loves writing and wants to share my knowledge and understanding with you.