Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures

I Homoliak, F Toffalini, J Guarnizo, Y Elovici… - ACM Computing …, 2019 - dl.acm.org
Insider threats are one of today's most challenging cybersecurity issues that are not well
addressed by commonly employed security solutions. In this work, we propose structural …

[HTML][HTML] A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations

MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin… - Applied Sciences, 2020 - mdpi.com
Insider threat has become a widely accepted issue and one of the major challenges in
cybersecurity. This phenomenon indicates that threats require special detection systems …

[PDF][PDF] Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques.

J Hunker, CW Probst - J. Wirel. Mob. Networks Ubiquitous Comput …, 2011 - isyou.info
Threats from the inside of an organization's perimeters are a significant problem, since it is
difficult to distinguish them from benign activity. In this overview article we discuss defining …

Fiends and fools: a narrative review and neo-socioanalytic perspective on personality and insider threats

AR Marbut, PD Harms - Journal of Business and Psychology, 2024 - Springer
Insider threats represent a serious threat to organizations but are considered to be difficult to
predict and prevent. Although a growing body of research has examined personological …

Exposing the darkness within: A review of dark personality traits, models, and measures and their relationship to insider threats

PD Harms, A Marbut, AC Johnston, P Lester… - Journal of Information …, 2022 - Elsevier
Insider threats are a pernicious threat to modern organizations that involve individuals
intentionally or unintentionally engaging in behaviors that undermine or abuse information …

Sentiment classification for insider threat identification using metaheuristic optimized machine learning classifiers

D Mladenovic, M Antonijevic, L Jovanovic, V Simic… - Scientific Reports, 2024 - nature.com
This study examines the formidable and complex challenge of insider threats to
organizational security, addressing risks such as ransomware incidents, data breaches, and …

Insider attack protection: Lightweight password-based authentication techniques using ECC

S Rajamanickam, S Vollala, R Amin… - IEEE Systems …, 2019 - ieeexplore.ieee.org
The radical advancement in web services has drawn more attention toward intensifying the
security of numerous applications that interact and serve the Internet users. In order to …

Identifying at-risk employees: A behavioral model for predicting potential insider threats

FL Greitzer, LJ Kangas, CF Noonan, AC Dalton - 2010 - osti.gov
A psychosocial model was developed to assess an employee's behavior associated with an
increased risk of insider abuse. The model is based on case studies and research literature …

A new taxonomy of insider threats: an initial step in understanding authorised attack

MN Al-Mhiqani, R Ahmad, ZZ Abidin… - International …, 2018 - inderscienceonline.com
Insider threat represents one of the greatest challenges in the cyber security world. Insider
attackers have more privileged and legitimate access to the information and facilities …

[HTML][HTML] A taxonomy for threat actors' delivery techniques

A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - Applied Sciences, 2022 - mdpi.com
The main contribution of this paper is to provide an accurate taxonomy for delivery
techniques, which allows the detection of novel techniques and the identification of …