Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Please paraphrase the below

Insider Threats  A natural consequence of having defined the term "insider" is to consider the term "insider threat". As discussed in the previous section, again many different aspects can be important:

  • Risk to organization or organizational resources posed by actions (the entity as agent of the business);
  • Access type or system role;
  • Aim or intentionality or reason for misuse;
  • Level of technical expertise;
  • Type of malicious insider behaviour or system consequences; and
  • Threats from masquerader, traitors, and naive insiders.

The last point of masqueraders (individuals pretending to be legitimate insiders but without valid access), traitors (legitimate insiders acting in malicious ways), and na ¨ive insiders (who cause damage without malicious intent) is very closely related to the question of motivation discussed above. The problem of interest is dealing with the "real real insider"-an individual deeply embedded in an organization (e.g., a high level executive, or a systems administrator). Detection techniques for each of these types of insider threats will vary. ?The impact of insider threats can occur in multiple dimensions: financial loss, disruption to the organization, loss of reputation, and long term impacts on organi- zational culture. These impacts can be highly nuanced, and are neither well or easily measured or accounted for. An important aspect here is that "bonus round" insider threats (actions taken in anger, revenge, spite regarding bonuses, compensation) can have severe consequences on all levels of an organization. Thus a rather "small" or meaningless motivation for the individual can have a rather huge impact for the organization. Equally, the impact may not depend on motivation-an innocent act can have as devastating an effect as a maliciously motivated attack. The goal of detecting insider threats may therefore be to avoid catastrophic consequences regardless of the motivation. These aspects as well as other risk accelerants should be represented in threat models, to acknowledge their importance.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92778323
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Computer Engineering

What are some analysis and crime investigative methods that

What are some analysis and crime investigative methods that could be used in identifying gangs and/or gang activities?

Discuss the relationship between fundamental analysis and

Discuss the relationship between fundamental analysis and intrinsic value. Include real-world examples in your explanation.

Question suppose you need to manually sort a hand of cards

Question : Suppose you need to manually sort a hand of cards. What techniques, other than a bubble sort, would you implement? Describe one or more algorithms at a high level.

As a wealthy graduate of the university you have decided to

As a wealthy graduate of the University, you have decided to give back to the University in the form of a scholarship. You have decided to donate a one-time gift of $500,000 that will be invested at a rate of 5.5% per ye ...

Start by assigning to variable answers a list containing an

Start by assigning to variable answers a list containing an arbitrary sequence of strings 'Y' and 'N'. For example: answers= ['Y','N','N','Y','N','Y','Y','Y','N','N','N'] Write Python statements corresponding to the foll ...

Imagine an election with just two candidates candidate a

Imagine an election with just two candidates. Candidate A asks her consultant to conduct a poll to see if she (Candidate A) is leading. What is the "null hypothesis" value that is being "tested" in this example?  Your an ...

A chest has 3 drawers d1 has two silver coins s d2 has one

A chest has 3 drawers: (D 1 ) has two silver coins (S), (D 2 ) has one silver (S) and one gold (G), and (D 3 ) has two gold (G) coins. The drawer and coin were both randomly selected. Use the law of total probability to ...

How does the learning environment effect the success of

How does the learning environment effect the success of students? Provide examples.

Question suppose a binary tree t has 10 nodes which are

Question : Suppose a binary tree T has 10 nodes which are labeled 0,1,2,...,9. We ran the inorder and postorder traversals on the tree and the nodes were processed in the following order: inorder traversal: 0,3,1,2,9,4,6 ...

What is 4g and its benefits how fast is your internet

What is 4G and its benefits. How fast is your Internet service supposed to be for stationary users?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As