Franqueira, Virginia Nunes Leal and van Eck, Pascal (2006) Defense against Insider Threat: a Framework for Gathering Goal-based Requirements. Project Report. Centre for Telematics and Information Technology, University of Twente, Enschede.
- Published Version
Insider threat is becoming comparable to outsider threat in frequency of security events. This is a very worrying situation, as insider attacks have a high probability of success because insiders have authorized access and legitimate privileges. As a result, organizations can suffer financial losses and damage to assets and to reputation. Despite their importance, insider threats are still not properly addressed by organizations. We contribute to reverse this situation by introducing a framework composed of a method and of supporting awareness deliverables. The method organizes the identification and assessment of insider threat risks from the perspective of the organization goal(s)/business mission. This method is supported by three deliverables. First, by attack strategies structured in four decomposition trees. Second, by a pattern of insider attack which reduces an insider attack step to six possible scenarios. Third, by a list of defense strategies which helps on the elicitation of requirements. The output of the method consists of goal-based requirements for the defense against insiders. Attack and defense strategies are collected from the literature and from organizational control principles.
|Item Type:||Monograph (Project Report)|
|Uncontrolled Keywords (separate with ;):||Insider threat; control principles; attack strategies; defense strategies; risk assessment|
|Subjects:||Computer science > Computer architectures & operating systems|
|Schools:||College of Science and Technology > School of Physical Sciences and Computing|
|Deposited By:||Carmit Erez|
|Deposited On:||01 Nov 2012 16:36|
|Last Modified:||17 May 2016 12:34|
Downloads per month over past year
Downloads for past 30 days
Repository Staff Only: item control page