About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Journal article

Insiders and Insider Threats: An Overview of Definitions and Mitigation Techniques

From

Jeffrey Hunker Associates LLC1

Language-Based Technology, Department of Informatics and Mathematical Modeling, Technical University of Denmark2

Department of Informatics and Mathematical Modeling, Technical University of Denmark3

Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to discuss a number of approaches from the technological, the sociological, and the socio-technical domain.

We draw two main conclusions. Tackling insider threats requires a combination of techniques from the technical, the sociological, and the socio-technical domain, to enable qualified detection of threats, and their mitigation. Another important observation is that the distinction between insiders and outsiders seems to loose significance as IT infrastructure is used in performing insider attacks.

Language: English
Year: 2011
Pages: 4-27
ISSN: 20935382 and 20935374
Types: Journal article
ORCIDs: Probst, Christian W.

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis