Abstract
The insider threat that organizations and cooperation face today is a real and serious issue that has become increasingly difficult to address as time has passed. More complex approaches must be researched and developed for reliable recognition, detection, and response to insider threats. One way to achieve this is by identifying and classifying diverse viewpoints of insider threats. Various studies focused on comprehending and mitigating insider threats by developing different taxonomies and terminologies relating to insiders, insider threats, and insider attacks. However, few are concerned about the severity and impact of insider threats to an organization. Therefore, this paper proposes a taxonomy for profiling potential malicious attacks, highlighting severity to determine the impact of insider threats and the prioritization of vulnerability remediation activities.
| Original language | English |
|---|---|
| Pages (from-to) | 4827-4838 |
| Number of pages | 12 |
| Journal | Journal of Theoretical and Applied Information Technology |
| Volume | 100 |
| Issue number | 13 |
| Publication status | Published - Jul 15 2022 |
| Externally published | Yes |
Keywords
- Impact
- Insider Threat Detection
- Insider threat
- Severity
- Taxonomy
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science
Fingerprint
Dive into the research topics of 'INSIDER THREATS: PROFILING POTENTIAL MALICIOUS ATTACKS, SEVERITY AND IMPACT'. Together they form a unique fingerprint.Cite this
- APA
- Standard
- Harvard
- Vancouver
- Author
- BIBTEX
- RIS