Please use this identifier to cite or link to this item:
|Title:||A critical reflection on the threat from human insiders - Its nature, industry perceptions, and detection approaches|
|Authors:||Nurse, J. R. C.|
Legg, P. A.
|Citation:||Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8533 LNCS, pp. 270-281|
|Abstract:||Organisations today operate in a world fraught with threats, including "script kiddies", hackers, hacktivists and advanced persistent threats. Although these threats can be harmful to an enterprise, a potentially more devastating and anecdotally more likely threat is that of the malicious insider. These trusted individuals have access to valuable company systems and data, and are well placed to undermine security measures and to attack their employers. In this paper, we engage in a critical reflection on the insider threat in order to better understand the nature of attacks, associated human factors, perceptions of threats, and detection approaches. We differentiate our work from other contributions by moving away from a purely academic perspective, and instead focus on distilling industrial reports (i.e., those that capture practitioners' experiences and feedback) and case studies in order to truly appreciate how insider attacks occur in practice and how viable preventative solutions may be developed. © 2014 Springer International Publishing.|
|Rights:||Copyright © 2014, Springer International Publishing Switzerland. Deposited with reference to the publisher’s archiving policy available on the SHERPA/RoMEO website. The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-07620-1_24|
|Description:||The file associated with this record is under a 12-month embargo from publication in accordance with the publisher's self-archiving policy, available available on the SHERPA/RoMEO website.|
|Appears in Collections:||Published Articles, Dept. of Media and Communication|
Files in This Item:
|Nurse_has2014_paper.pdf||Post-review (final submitted)||179.37 kB||Adobe PDF||View/Open|
Items in LRA are protected by copyright, with all rights reserved, unless otherwise indicated.