Insider threats in information security categories and approaches

Nebrase Elmrabit, Shuang-Hua Yang, Lili Yang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)

Abstract

The main concern of most security experts in the last years is the need to mitigate insider threats. However, leaking and selling data these days is easier than before; with the use of the invisible web, insiders can leak confidential data while remaining anonymous. In this paper, we give an overview of the various basic characteristics of insider threats. We also consider current approaches and controls to mitigating the level of such threats by broadly classifying them into two categories.
Original languageEnglish
Title of host publication2015 21st International Conference on Automation and Computing (ICAC)
PublisherIEEE
Pages1-6
Number of pages6
ISBN (Electronic)9780992680114
ISBN (Print)9780992680107
DOIs
Publication statusPublished - 2 Nov 2015

Keywords

  • Insider threats
  • data leaking
  • insider attacks
  • insider predictions
  • privileged user abuse

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Computer Networks and Communications
  • Computer Science Applications
  • Modelling and Simulation

Fingerprint

Dive into the research topics of 'Insider threats in information security categories and approaches'. Together they form a unique fingerprint.

Cite this