Preview

Predictive Modeling for Insider Threat Mitigation

Good Essays
Open Document
Open Document
660 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Predictive Modeling for Insider Threat Mitigation
Predictive Modeling for Insider Threat Mitigation This project, funded by PNNL’s Laboratory Directed Research and Development Program is conducted under the Predictive Defense focus area of the Laboratory’s Information and Infrastructure Integrity Initiative. The current practice for addressing the insider cyber threat is to monitor the network and individual systems to identify when someone is not following established policy or is abusing their authorized level of access in a way that is harmful to the organization. The study takes many different approaches in order prevent inside threats. The main targets of this research were the current and former employees who had access to the information system, data or network with the degree of trust by the organization. Recent studies and surveys of cybercrime in both government and commercial sectors shows that current or former employees are the second greatest cyber crime threat. According to the 2007 e-Crime survey most insiders targeted proprietary information, include intellectual property, and customer and financial information. Many people argued that most threats can be easily prevented by “timely and effective action to address the anger, pain, anxiety, or psychological impairment of perpetrators who exhibit signs of vulnerability or risk well in advance of the crime of abuse.” This statement suggests that more research is needed on predictive indicators. But when it comes to predict who and when will commit an inside crime is still hard to predict. According to this research “currently, no single threat assessment technique gives a complete picture of the insider threat problem.” Many researcher suggests that a proactive approach must recognize possible precursors to insider threats behavior that are visible in employee behavior. There has been some controversy between the organization guarding their assets and employee privacy rights. Many organizations say that monitoring employees is a

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Internet and network security are a primary concern for many businesses. In today 's world, the number of hacks and leaks of data is continuing to rise, which is what makes security the primary concern. What may or may not be apparent is that many breaches of data tend to be caused by internal users ' errors that may not even have been meant to be malicious. Liaskos and Sandy quote a study by Roman which revealed…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    For any information security audit to be effective, with the intent to prevent or reduce attacks; it is absolutely necessary to be proactive and first create an insider threat program, that reinforces the fundamental purpose of the CIA triad which highlights information confidentiality, and how protection of company assets is most vital to the preservation of authorized restrictions and how information is accessed and disclosed.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4

    • 1878 Words
    • 8 Pages

    Organizations invest a large portion of their information technology budgets on security applications and services, such as antivirus software, firewalls, and encryption. But no matter how much security hardware or software you deploy, how tightly you control the rights of users, or carefully you configure security permissions on your data, you should not consider the job complete unless you have a well-defined, timely auditing strategy to track the effectiveness of your defenses and identify attempts to circumvent them.…

    • 1878 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Xcom/285 Privacy Laws

    • 321 Words
    • 2 Pages

    In times like today a company needs to know what is going on within itself. This means that having access to computers, email, mobile devices along with monitoring systems in the work place. Some of my fellow classmates to not agree with some of the practices but per our reading in Workplace Privacy it stays that “Under the “ordinary course of business” exemption, for example, employers may monitor email communications if the employer can show a legitimate business purpose for doing so” (Friedman, Reed, 2007). If employees know that they are being closely watched it decreases the chances of them not working or cheating the company.…

    • 321 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    once again brought to light the various concerns and complaints that this contentious area inevitably generates. The idea of monitoring employees’ conversations has a certain Orwellian darkness that encourages accusations of privacy invasion and corporate spying. Indeed, some companies have taken this too far – some reportedly even requesting their employee’s Facebook login details. However, by and large the concept of employee monitoring – when done appropriately – seems to me to be relatively contentious.…

    • 687 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    As we already know Fullsoft Inc, has recently experienced a malware attack that has resulted in proprietary information being leaked. Even though the company is now in the process of this breach being recovered, we will need to come up with a plan so we can prevent such incident of happening again.…

    • 1033 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Employee monitoring has emerged as a necessity and yet as a very controversial issue due to the widespread use of technology. Employee monitoring is the act of watching and monitoring employees' actions during working hours using employer equipment/property. This phrase can be a little scary as an employee, where is the line? The restroom is their property; thankfully there are employers who know their boundaries. Legally employers are continuing to monitor their employees. The only issue that seems to be addressed is how much they can monitor them.…

    • 1403 Words
    • 6 Pages
    Better Essays
  • Good Essays

    There is much debate over what employers should and should not be able to do when it comes to monitoring the communications of individuals under their employment. There are those who feel that the rights of the individual are not limited to protection from the Government and employers have limited rights in regards to employee communication. There those that feel that the employer should have very little to no restraint in monitoring those under their employment. Going too far in either the employers or employee position can create an unproductive and unrealistic standard for a working environment. Employers must be able to create and maintain both a productive and safe working environment from their employees. However this does not mean employees should be subject to unreasonable and intrusive monitoring practices by their employer. Communication privacy laws and workplace policies should be carefully crafted to provided balanced protection both the interest of employer and employee.…

    • 735 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Koenig, Dan. (2002). Investigation of Cybercrime and Tehnology-related Crime. The National Executive Institute Associates Leadership Bulletin. Retrieved November 12, 2005 from, www.neiassociates.org/cybercrime.htm…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Privacy Law Affect

    • 309 Words
    • 2 Pages

    Privacy issue occurs when employers enforce certain rules and procedures in the workplace that violate an employee’s freedom to do as they please.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer crimes are criminal activities that involve using a computer and a network to gain unauthorized access with the intent of deleting, altering, or damaging computer data. Due to them being extremely versatile, establishing criminal and noncriminal behavior when in use can be very difficult at times. “According to the U.S. Uniform Crime Reporting Statistics, by 2000 more than 300 million users around the globe accessed the World Wide Web. Of those, at least 1 million were engaged in illegal Internet activities (computer crime or "cyber-crime"). Cyber-crimes include Internet-related forgery, embezzlement, fraud, vandalism, and the disposal of stolen goods. The potential threat to the overall development of e-commerce was serious—so much that online security expenditures were expected to double to $30 billion in 2004” (Computer Crime – Definitions). The four most common categories of computer crimes are infrastructure attacks, technological facilitation, information attacks, and promotion.…

    • 733 Words
    • 3 Pages
    Good Essays