期刊名称:Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
印刷版ISSN:2093-5374
电子版ISSN:2093-5382
出版年度:2014
卷号:5
期号:2
页码:1-6
出版社:Innovative Information Science & Technology Research Group
摘要:The insider threat is one of mankind's most enduring security challenges. For as long as people have placed trust in one other, they have faced the risk of that trust being violated. Historically, consequences of insider attacks included compromised organizational security, financial loss, and risks to human health and safety. Prior to the information age, attacks mainly targeted tangible assets, such as people or money; now insider attacks target additional assets related to information technology (IT), such as data and sys- tems. For instance, malicious insiders may steal intellectual property, sabotage corporate IT systems, or use IT systems to commit financial fraud. Insider attacks have plagued humanity for millennia, and researchers and security professionals continue to struggle to fully understand the breadth of the prob- lem and to propose solutions proven to have measurable effects on reducing the occurrence and impact of attacks. Even defining "insider threat" can be problematic, depending on the problem space. One definition used in the IT security arena is as follows