{"title":"Malicious Insider Threat Types – An Empirical Analysis","authors":"Manfred Hofmeier, Isabelle Haunschild, Ulrike Lechner","doi":"10.18690/um.fov.6.2023.8","DOIUrl":null,"url":null,"abstract":"Malicious insider threats represent a particular challenge not only for defense, but also for research, as it is estimated there is a high number of unreported cases. Current taxonomies and typologies usually focus on specific aspects, such as goal or motivation, and tend to have tight boundaries. A number of malicious insider threat attack scenarios were identified in our research through qualitative interviews, enhanced with a game-based creative approach. The resulting data was used to develop a malicious insider threat typology in an empirical bottom-up approach. We developed an analysis scheme from existing taxonomies and typologies and used it in an empirical analysis of malicious insider roles and attack scenarios. We were able to identify eleven archetypes of malicious insider threats considering multiple facettes. This paper describes the analysis and the identified types.","PeriodicalId":504907,"journal":{"name":"36th Bled eConference – Digital Economy and Society: The Balancing Act for Digital Innovation in Times of Instability: June 25 – 28, 2023, Bled, Slovenia, Conference Proceedings","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"36th Bled eConference – Digital Economy and Society: The Balancing Act for Digital Innovation in Times of Instability: June 25 – 28, 2023, Bled, Slovenia, Conference Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18690/um.fov.6.2023.8","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Malicious insider threats represent a particular challenge not only for defense, but also for research, as it is estimated there is a high number of unreported cases. Current taxonomies and typologies usually focus on specific aspects, such as goal or motivation, and tend to have tight boundaries. A number of malicious insider threat attack scenarios were identified in our research through qualitative interviews, enhanced with a game-based creative approach. The resulting data was used to develop a malicious insider threat typology in an empirical bottom-up approach. We developed an analysis scheme from existing taxonomies and typologies and used it in an empirical analysis of malicious insider roles and attack scenarios. We were able to identify eleven archetypes of malicious insider threats considering multiple facettes. This paper describes the analysis and the identified types.