Business security: IC Insider Threats Essay

Exclusively available on IvyPanda Available only on IvyPanda

Recently, insider threats have become one of the most complex problems in various kinds of companies. This problem is especially acute in structures closely related to ensuring security, including state security. Most of all, in such situations, systems with a certain degree of openness, such as government, industry, universities, and research laboratories systems suffer (National Counterintelligence and Security Center [NCSC], 2017). The loss of valuable information in such structures can lead to a wide variety of consequences. That is why the IC manager and leader must concentrate all forces on ensuring all protective measures and counter-intelligence programs. The purpose of this essay is to discuss the role of various new technologies in countering insider threats.

We will write a custom essay on your topic a custom Essay on Business security: IC Insider Threats
808 writers online

First, it is necessary to determine what exactly the insider threat is and who the insider is. According to Hunker and Probst, an insider can be a person who has privileged, legal access to any organizational structure and has the right to represent it or make changes to it (2011). Accordingly, an insider threat can be described as a threat emanating from a person who uses his or her access for other purposes or whose access leads to improper use of the system. The most critical aspects that define an insider are access to the system, the ability to represent the system to outsiders, as well as the trust of the organization and knowledge (Hunker & Probst, 2011). Thus, counteraction to insiders should be directed along the way of these aspects.

All approaches to solving the insider threat problem can be divided into two types: social and technical. According to Safa and Furnell et al., factors such as the severity of sanctions and lower remuneration have a substantial impact on employees’ attitudes toward the company (2019). Accordingly, to reduce risks, managers are advised to pay attention to environmental factors and improve the working environment (Safa & Watson et al., 2018). However, these factors can only generally improve the situation, and for effective results, it is necessary to use technical measures. Such measures may be, for example, host-based analytics, which analyzes data collected from the host, i.e., from every computer.

A variety of statistics can fall into the category of this data, from the simplest values to data from applications. Such data may seem useless, but with the accumulation of statistics, this approach allows us to evaluate user behavior (Liu et al., 2018). As stated above, a host is assessed by a variety of parameters, starting with system calls. These operations give a concept and idea of exactly how the program accesses the internal resources of the computer. Thus, this method is useful for an in-depth analysis of user actions on the host computer, which allows detecting violations in work.

Keyboard and mouse usage dynamics are directly related to user behavior. Since the data collected is directly personal, this method is most suitable for identifying people who impersonate workers, the so-called “masqueraders” (Liu et al., 2018). Finally, one of the most sophisticated methods is to track the logs of committed actions. Its complexity lies in the massive amount of data obtained, but even in them, useful information can be found. For example, a long chain of login errors can signal a blatant attempt to break into a system (Liu et al., 2018). In addition to these three factors, there are many more, for example, the study of network traffic, but they are all united by the same idea.

Thus, host-based analysis is an effective and multifaceted method of preventing and detecting insider threats. Unlike various social, this method allows to identify an intruder directly by collecting information about the user. However, the disadvantage of this method is the difficulty of implementing these algorithms, since, in addition to issuing the correct result in this matter, the speed of rendering this result is also critical. Accordingly, the organization of host-based analysis requires powerful machines and trained specialists.

References

Hunker, J., & Probst, C. W. (2011). . JoWUA, 2(1), 4-27. Web.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Liu, L., De Vel, O., Han, Q. L., Zhang, J., & Xiang, Y. (2018). . IEEE Communications Surveys & Tutorials, 20(2), 1397-1417. Web.

National Counterintelligence and Security Center. (2017). . Web.

Safa, N. S., Maple, C., Furnell, S., Azad, M. A., Perera, C., Dabbagh, M., & Sookhak, M. (2019). Deterrence and prevention-based model to mitigate information security insider threats in organisations. Future Generation Computer Systems, 97, 587-597. Web.

Safa, N. S., Maple, C., Watson, T., & Von Solms, R. (2018). Motivation and opportunity based model to reduce information security insider threats in organisations. Journal of information security and applications, 40, 247-257. Web.

Print
Need an custom research paper on Business security: IC Insider Threats written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, February 13). Business security: IC Insider Threats. https://ivypanda.com/essays/business-security-ic-insider-threats/

Work Cited

"Business security: IC Insider Threats." IvyPanda, 13 Feb. 2022, ivypanda.com/essays/business-security-ic-insider-threats/.

References

IvyPanda. (2022) 'Business security: IC Insider Threats'. 13 February.

References

IvyPanda. 2022. "Business security: IC Insider Threats." February 13, 2022. https://ivypanda.com/essays/business-security-ic-insider-threats/.

1. IvyPanda. "Business security: IC Insider Threats." February 13, 2022. https://ivypanda.com/essays/business-security-ic-insider-threats/.


Bibliography


IvyPanda. "Business security: IC Insider Threats." February 13, 2022. https://ivypanda.com/essays/business-security-ic-insider-threats/.

Powered by CiteTotal, easy referencing generator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1