Business security: IC Insider Threats Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Recently, insider threats have become one of the most complex problems in various kinds of companies. This problem is especially acute in structures closely related to ensuring security, including state security. Most of all, in such situations, systems with a certain degree of openness, such as government, industry, universities, and research laboratories systems suffer (National Counterintelligence and Security Center [NCSC], 2017). The loss of valuable information in such structures can lead to a wide variety of consequences. That is why the IC manager and leader must concentrate all forces on ensuring all protective measures and counter-intelligence programs. The purpose of this essay is to discuss the role of various new technologies in countering insider threats.

First, it is necessary to determine what exactly the insider threat is and who the insider is. According to Hunker and Probst, an insider can be a person who has privileged, legal access to any organizational structure and has the right to represent it or make changes to it (2011). Accordingly, an insider threat can be described as a threat emanating from a person who uses his or her access for other purposes or whose access leads to improper use of the system. The most critical aspects that define an insider are access to the system, the ability to represent the system to outsiders, as well as the trust of the organization and knowledge (Hunker & Probst, 2011). Thus, counteraction to insiders should be directed along the way of these aspects.

All approaches to solving the insider threat problem can be divided into two types: social and technical. According to Safa and Furnell et al., factors such as the severity of sanctions and lower remuneration have a substantial impact on employees’ attitudes toward the company (2019). Accordingly, to reduce risks, managers are advised to pay attention to environmental factors and improve the working environment (Safa & Watson et al., 2018). However, these factors can only generally improve the situation, and for effective results, it is necessary to use technical measures. Such measures may be, for example, host-based analytics, which analyzes data collected from the host, i.e., from every computer.

A variety of statistics can fall into the category of this data, from the simplest values to data from applications. Such data may seem useless, but with the accumulation of statistics, this approach allows us to evaluate user behavior (Liu et al., 2018). As stated above, a host is assessed by a variety of parameters, starting with system calls. These operations give a concept and idea of exactly how the program accesses the internal resources of the computer. Thus, this method is useful for an in-depth analysis of user actions on the host computer, which allows detecting violations in work.

Keyboard and mouse usage dynamics are directly related to user behavior. Since the data collected is directly personal, this method is most suitable for identifying people who impersonate workers, the so-called “masqueraders” (Liu et al., 2018). Finally, one of the most sophisticated methods is to track the logs of committed actions. Its complexity lies in the massive amount of data obtained, but even in them, useful information can be found. For example, a long chain of login errors can signal a blatant attempt to break into a system (Liu et al., 2018). In addition to these three factors, there are many more, for example, the study of network traffic, but they are all united by the same idea.

Thus, host-based analysis is an effective and multifaceted method of preventing and detecting insider threats. Unlike various social, this method allows to identify an intruder directly by collecting information about the user. However, the disadvantage of this method is the difficulty of implementing these algorithms, since, in addition to issuing the correct result in this matter, the speed of rendering this result is also critical. Accordingly, the organization of host-based analysis requires powerful machines and trained specialists.

References

Hunker, J., & Probst, C. W. (2011). . JoWUA, 2(1), 4-27. Web.

Liu, L., De Vel, O., Han, Q. L., Zhang, J., & Xiang, Y. (2018). . IEEE Communications Surveys & Tutorials, 20(2), 1397-1417. Web.

National Counterintelligence and Security Center. (2017). . Web.

Safa, N. S., Maple, C., Furnell, S., Azad, M. A., Perera, C., Dabbagh, M., & Sookhak, M. (2019). Deterrence and prevention-based model to mitigate information security insider threats in organisations. Future Generation Computer Systems, 97, 587-597. Web.

Safa, N. S., Maple, C., Watson, T., & Von Solms, R. (2018). Motivation and opportunity based model to reduce information security insider threats in organisations. Journal of information security and applications, 40, 247-257. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, February 13). Business security: IC Insider Threats. https://ivypanda.com/essays/business-security-ic-insider-threats/

Work Cited

"Business security: IC Insider Threats." IvyPanda, 13 Feb. 2022, ivypanda.com/essays/business-security-ic-insider-threats/.

References

IvyPanda. (2022) 'Business security: IC Insider Threats'. 13 February.

References

IvyPanda. 2022. "Business security: IC Insider Threats." February 13, 2022. https://ivypanda.com/essays/business-security-ic-insider-threats/.

1. IvyPanda. "Business security: IC Insider Threats." February 13, 2022. https://ivypanda.com/essays/business-security-ic-insider-threats/.


Bibliography


IvyPanda. "Business security: IC Insider Threats." February 13, 2022. https://ivypanda.com/essays/business-security-ic-insider-threats/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1