全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Consideration of Insider Based Collusion Attacks on Cyber Systems - Volume 9 Number 2 ( May. 2019) - IJSSH

DOI: 10.18178/IJSSH

Full-Text   Cite this paper   Add to My Lib

Abstract:

Abstract—Insider threats are a growing concern to both public and private entities. Like other threats within the cyber realm, these threats tend to be dynamic in nature. Organizational structures and varying motivating factors of threat actors can impact the effectiveness of mitigating technologies and strategies. This paper explores the gaps that result when organizations try to segment logical and physical assets, which in turn creates the opportunity for collusion or coordinated attacks. In this paper, various data sources have been examined to identify organizational patterns that can potentially contribute to the successful outcome of these types of attacks. A motivating example is then presented, in junction with the data, to hypothesis what percentage of organizations would be able to identify the actions of insiders working in tandem based on the current state of the industry. Index Terms—Collusion attack, coordinated attack, cyber threats, insider threat. James B. McNicholas III and Houssain Kettani are with Dakota State University, United States (e-mail: James.McNicholas@trojans.dsu.edu, houssain.kettani@dsu.edu) [PDF] Cite: James B. McNicholas III and Houssain Kettani, "Consideration of Insider Based Collusion Attacks on Cyber Systems," International Journal of Social Science and Humanity vol. 9, no. 2, pp. 31-35, 2019

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133