{"title":"预测组织内部威胁的模型","authors":"S. Zaikin, O. Kitura","doi":"10.31673/2409-7292.2021.013034","DOIUrl":null,"url":null,"abstract":"The article considers the concepts of \"insider threat\" and \"insider\". General methods of using insider threats by cybercriminals to compromise the network environment of the organization to gain access to valuable assets are identified. The types of insider threats and their criticality for organizations to deal with these threats to reduce risk are studied. It is concluded that no approach can solve the security problem. In order to mitigate the insider threat, further research is needed on cybersecurity insider threats, and the right approach to combating a malicious insider threat from different perspectives should be identified. It is noted that organizations can implement some basic measures that can reduce the number of cases of insider threats to a minimum.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Model of predicting insider threat in the organization\",\"authors\":\"S. Zaikin, O. Kitura\",\"doi\":\"10.31673/2409-7292.2021.013034\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article considers the concepts of \\\"insider threat\\\" and \\\"insider\\\". General methods of using insider threats by cybercriminals to compromise the network environment of the organization to gain access to valuable assets are identified. The types of insider threats and their criticality for organizations to deal with these threats to reduce risk are studied. It is concluded that no approach can solve the security problem. In order to mitigate the insider threat, further research is needed on cybersecurity insider threats, and the right approach to combating a malicious insider threat from different perspectives should be identified. It is noted that organizations can implement some basic measures that can reduce the number of cases of insider threats to a minimum.\",\"PeriodicalId\":107068,\"journal\":{\"name\":\"Modern information security\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Modern information security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31673/2409-7292.2021.013034\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2021.013034","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Model of predicting insider threat in the organization
The article considers the concepts of "insider threat" and "insider". General methods of using insider threats by cybercriminals to compromise the network environment of the organization to gain access to valuable assets are identified. The types of insider threats and their criticality for organizations to deal with these threats to reduce risk are studied. It is concluded that no approach can solve the security problem. In order to mitigate the insider threat, further research is needed on cybersecurity insider threats, and the right approach to combating a malicious insider threat from different perspectives should be identified. It is noted that organizations can implement some basic measures that can reduce the number of cases of insider threats to a minimum.