DocumentCode
168024
Title
A Method of Evaluation for Insider Threat
Author
Yi-Lu Wang ; Sang-Chin Yang
Author_Institution
Sch. of Defense Sci., Nat. Defense Univ., Taoyuan, Taiwan
fYear
2014
fDate
10-12 June 2014
Firstpage
438
Lastpage
441
Abstract
Due to cyber security is an important issue of the cloud computing. Insider threat becomes more and more important for cyber security, it is also much more complex issue. But till now, there is no equivalent to a vulnerability scanner for insider threat. We survey and discuss the history of research on insider threat analysis to know system dynamics is the best method to mitigate insider threat from people, process, and technology. In the paper, we present a system dynamics method to model insider threat. We suggest some concludes for future research who are interested in insider threat issue The study.
Keywords
cloud computing; security of data; cloud computing; cyber security; insider threat analysis; insider threat evaluation; insider threat mitigation; vulnerability scanner; Analytical models; Computer crime; Computers; Educational institutions; Organizations; Insider threat; System Dynamic;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer, Consumer and Control (IS3C), 2014 International Symposium on
Conference_Location
Taichung
Type
conf
DOI
10.1109/IS3C.2014.121
Filename
6845913
Link To Document