Organizations' readiness for insider attacks: A process‐oriented approach

Azzah A. AlGhamdi, Mahmood Niazi, Mohammad Alshayeb, Sajjad Mahmood
{"title":"Organizations' readiness for insider attacks: A process‐oriented approach","authors":"Azzah A. AlGhamdi, Mahmood Niazi, Mohammad Alshayeb, Sajjad Mahmood","doi":"10.1002/spe.3327","DOIUrl":null,"url":null,"abstract":"ContextOrganizations constantly strive to protect their assets from outsider attacks by implementing various security controls, such as data encryption algorithms, intrusion detection software, firewalls, and antivirus programs. Unfortunately, attackers strike not only from outside the organization but also from within. Such internal attacks are called insider attacks or threats, and the people responsible for them are insider attackers or insider threat agents. Insider attacks pose more significant risks and can result in greater organizational losses than outsider attacks. Thus, every organization should be vigilant regarding such attackers to protect its valuable resources from harm. Finding solutions to protect organizations from such attacks is critical. Despite the importance of this topic, little research has been conducted on providing solutions to mitigate insider attacks.ObjectiveThis study aims to develop an organizational readiness model to assess an organization's readiness for insider attacks.MethodWe conducted a multivocal literature review to identify practices that can be used to assess organizations' readiness against insider attacks. These practices were grouped into different knowledge areas of insider attacks for organizations. The insider attack readiness model was developed using identified best practices and knowledge areas: compliance, top management, human resources, and technical.ResultsThis model was evaluated at two levels—academic and real‐world environments. The evaluation results show that the proposed model can identify organizations' readiness against insider attacks.ConclusionThe proposed model can guide organizations through a secure environment against insider attacks.","PeriodicalId":21899,"journal":{"name":"Software: Practice and Experience","volume":"128 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Software: Practice and Experience","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/spe.3327","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

ContextOrganizations constantly strive to protect their assets from outsider attacks by implementing various security controls, such as data encryption algorithms, intrusion detection software, firewalls, and antivirus programs. Unfortunately, attackers strike not only from outside the organization but also from within. Such internal attacks are called insider attacks or threats, and the people responsible for them are insider attackers or insider threat agents. Insider attacks pose more significant risks and can result in greater organizational losses than outsider attacks. Thus, every organization should be vigilant regarding such attackers to protect its valuable resources from harm. Finding solutions to protect organizations from such attacks is critical. Despite the importance of this topic, little research has been conducted on providing solutions to mitigate insider attacks.ObjectiveThis study aims to develop an organizational readiness model to assess an organization's readiness for insider attacks.MethodWe conducted a multivocal literature review to identify practices that can be used to assess organizations' readiness against insider attacks. These practices were grouped into different knowledge areas of insider attacks for organizations. The insider attack readiness model was developed using identified best practices and knowledge areas: compliance, top management, human resources, and technical.ResultsThis model was evaluated at two levels—academic and real‐world environments. The evaluation results show that the proposed model can identify organizations' readiness against insider attacks.ConclusionThe proposed model can guide organizations through a secure environment against insider attacks.
组织应对内部人员攻击的准备情况:以流程为导向的方法
背景组织通过实施各种安全控制措施,如数据加密算法、入侵检测软件、防火墙和防病毒程序,不断努力保护其资产免受外部攻击。不幸的是,攻击者不仅会从组织外部发动攻击,也会从组织内部发动攻击。这种内部攻击被称为内部攻击或威胁,其责任人是内部攻击者或内部威胁代理。与外部攻击相比,内部攻击带来的风险更大,可能导致更大的组织损失。因此,每个组织都应对这类攻击者保持警惕,以保护其宝贵的资源不受伤害。找到保护组织免受此类攻击的解决方案至关重要。本研究旨在开发一种组织准备就绪模型,用于评估组织应对内部人员攻击的准备就绪程度。方法我们进行了多方文献综述,以确定可用于评估组织应对内部人员攻击准备就绪程度的实践。这些实践被归类为组织内部人员攻击的不同知识领域。利用确定的最佳实践和知识领域(合规、高层管理、人力资源和技术),开发了内部人员攻击准备模型。评估结果表明,所提出的模型可以确定组织是否做好了防范内部人员攻击的准备。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信