IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Insider Attack Analysis in Building Effective Cyber Security for an Organization

Insider Attack Analysis in Building Effective Cyber Security for an Organization
View Sample PDF
Author(s): Sunita Vikrant Dhavale (Defence Institute of Advanced Technology, India)
Copyright: 2018
Pages: 17
Source title: Psychological and Behavioral Examinations in Cyber Security
Source Author(s)/Editor(s): John McAlaney (Bournemouth University, UK), Lara A. Frumkin (Open University, UK)and Vladlena Benson (University of West London, UK)
DOI: 10.4018/978-1-5225-4053-3.ch013

Purchase

View Insider Attack Analysis in Building Effective Cyber Security for an Organization on the publisher's website for pricing and purchasing information.

Abstract

Recent studies have shown that, despite being equipped with highly secure technical controls, a broad range of cyber security attacks were carried out successfully on many organizations to reveal confidential information. This shows that the technical advancements of cyber defence controls do not always guarantee organizational security. According to a recent survey carried out by IBM, 55% of these cyber-attacks involved insider threat. Controlling an insider who already has access to the company's highly protected data is a very challenging task. Insider attacks have great potential to severely damage the organization's finances as well as their social credibility. Hence, there is a need for reliable security frameworks that ensure confidentiality, integrity, authenticity, and availability of organizational information assets by including the comprehensive study of employee behaviour. This chapter provides a detailed study of insider behaviours that may hinder organization security. The chapter also analyzes the existing physical, technical, and administrative controls, their objectives, their limitations, insider behaviour analysis, and future challenges in handling insider threats.

Related Content

Siva Raja Sindiramutty, Noor Zaman Jhanjhi, Chong Eng Tan, Navid Ali Khan, Bhavin Shah, Amaranadha Reddy Manchuri. © 2024. 58 pages.
Imdad Ali Shah, Raja Kumar Murugesan, Samina Rajper. © 2024. 31 pages.
Rana Muhammad Amir Latif, Muhammad Farhan, Navid Ali Khan, R. Sujatha. © 2024. 33 pages.
Imdad Ali Shah, Areesha Sial, Sarfraz Nawaz Brohi. © 2024. 25 pages.
Kassim Kalinaki, Wasswa Shafik, Sarah Namuwaya, Sumaya Namuwaya. © 2024. 24 pages.
Imdad Ali Shah, N. Z. Jhanjhi, Humaira Ashraf. © 2024. 24 pages.
Rida Zehra. © 2024. 18 pages.
Body Bottom