IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Insider Attack Analysis in Building Effective Cyber Security for an Organization

Insider Attack Analysis in Building Effective Cyber Security for an Organization
View Sample PDF
Author(s): Sunita Vikrant Dhavale (Defence Institute of Advanced Technology, India)
Copyright: 2019
Pages: 18
Source title: Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-5225-8897-9.ch070

Purchase

View Insider Attack Analysis in Building Effective Cyber Security for an Organization on the publisher's website for pricing and purchasing information.

Abstract

Recent studies have shown that, despite being equipped with highly secure technical controls, a broad range of cyber security attacks were carried out successfully on many organizations to reveal confidential information. This shows that the technical advancements of cyber defence controls do not always guarantee organizational security. According to a recent survey carried out by IBM, 55% of these cyber-attacks involved insider threat. Controlling an insider who already has access to the company's highly protected data is a very challenging task. Insider attacks have great potential to severely damage the organization's finances as well as their social credibility. Hence, there is a need for reliable security frameworks that ensure confidentiality, integrity, authenticity, and availability of organizational information assets by including the comprehensive study of employee behaviour. This chapter provides a detailed study of insider behaviours that may hinder organization security. The chapter also analyzes the existing physical, technical, and administrative controls, their objectives, their limitations, insider behaviour analysis, and future challenges in handling insider threats.

Related Content

Amdy Diene. © 2024. 12 pages.
B. Sam Paul, A. Anuradha. © 2024. 21 pages.
Muhsina, Zidan Kachhi. © 2024. 15 pages.
Burak Tomak, Ayşe Yılmaz Virlan. © 2024. 14 pages.
Allen Farina, Carolyn N. Stevenson. © 2024. 25 pages.
Sadhana Mishra. © 2024. 16 pages.
Catherine Hayes. © 2024. 17 pages.
Body Bottom