• DocumentCode
    168024
  • Title

    A Method of Evaluation for Insider Threat

  • Author

    Yi-Lu Wang ; Sang-Chin Yang

  • Author_Institution
    Sch. of Defense Sci., Nat. Defense Univ., Taoyuan, Taiwan
  • fYear
    2014
  • fDate
    10-12 June 2014
  • Firstpage
    438
  • Lastpage
    441
  • Abstract
    Due to cyber security is an important issue of the cloud computing. Insider threat becomes more and more important for cyber security, it is also much more complex issue. But till now, there is no equivalent to a vulnerability scanner for insider threat. We survey and discuss the history of research on insider threat analysis to know system dynamics is the best method to mitigate insider threat from people, process, and technology. In the paper, we present a system dynamics method to model insider threat. We suggest some concludes for future research who are interested in insider threat issue The study.
  • Keywords
    cloud computing; security of data; cloud computing; cyber security; insider threat analysis; insider threat evaluation; insider threat mitigation; vulnerability scanner; Analytical models; Computer crime; Computers; Educational institutions; Organizations; Insider threat; System Dynamic;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer, Consumer and Control (IS3C), 2014 International Symposium on
  • Conference_Location
    Taichung
  • Type

    conf

  • DOI
    10.1109/IS3C.2014.121
  • Filename
    6845913