Insider threats in Cyber Security: The enemy within the gates

11/21/2019
by   Guerrino Mazzarolo, et al.
0

Insider threats have become reality for civilian firms such as Tesla, which experienced sabotage and intellectual property theft, and Capital One, which suffered from fraud. Even greater social impact was caused by the data breach at the US Department of Defense, perpetrated by well-known attackers Chelsea Manning and Edward Snowden, whose espionage and hacktivist activities are widely known. The dramatic increase of such incidents in recent years and the incalculable damage committed by insiders must serve as a warning for all members of the cyber security community. It is no longer acceptable to continue to underestimate the problem of insider threats. Firms, organizations, institutions and governments need to lead and embrace a cultural change in their security posture. Through the adoption of an Insider Threat Program that engages all the strategic branches (including HR, Legal, Information Assurance, Cyber Security and Intelligence), coordinated by the chief information security officer and supported by c-level executive, it is possible to implement a framework that can prevent, detect, and respond to disloyal and/or unintentional insider threats. Hence, defending your enterprise from insider threats is a vital part of information security best practices. It is essential that your company highly valuable classified data and assets are protected from its greatest threat: the enemy within the gates.

READ FULL TEXT
research
12/15/2022

Defending against cybersecurity threats to the payments and banking system

Cyber security threats to the payment and banking system have become a w...
research
03/13/2023

A data-driven analysis of UK cyber defence

Our research addresses the question: What are the conditions of the UK's...
research
08/24/2018

"Should I Worry?" A Cross-Cultural Examination of Account Security Incident Response

Digital security technology is able to identify and prevent many threats...
research
08/22/2021

Framework for Managing Cybercrime Risks in Nigerian Universities

Universities in developing countries, including those in Nigeria, experi...
research
09/06/2021

Detection of Insider Threats using Artificial Intelligence and Visualisation

Insider threats are one of the most damaging risk factors for the IT sys...
research
04/16/2019

On the Impact of Perceived Vulnerability in the Adoption of Information Systems Security Innovations

A number of determinants predict the adoption of Information Systems (IS...

Please sign up or login with your details

Forgot password? Click here to reset