来自内部的威胁:实施信息技术破坏的内部人员案例研究

Jason W. Clark
{"title":"来自内部的威胁:实施信息技术破坏的内部人员案例研究","authors":"Jason W. Clark","doi":"10.1109/ARES.2016.78","DOIUrl":null,"url":null,"abstract":"In this paper, we investigate insider information technology sabotage. After an analysis of over 1200 cases in our insider threat corpus, we identified 97 insider information technology sabotage cases that are found in public records. In all of our cases, the insider has pleaded guilty or was convicted in a courtroom. The majority of the cases are (United States) domestic. We begin by providing an introduction to the problem space. Next, we provide an abridged case summary for a sample of the cases. Based on all of the cases, we perform an analysis to answer the following research questions: 1) Who are the insiders that commit insider information technology sabotage? 2) What is the motivation behind the insider attacking? 3) What technical means were used to launch the attack? 4) How were the insiders caught? 5) What damage did they cause? 6) What sentence did the insider receive? Lastly, we describe our aggregated results and provide best practices to help mitigate the type of insider threat we describe.","PeriodicalId":216417,"journal":{"name":"2016 11th International Conference on Availability, Reliability and Security (ARES)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Threat from Within: Case Studies of Insiders Who Committed Information Technology Sabotage\",\"authors\":\"Jason W. Clark\",\"doi\":\"10.1109/ARES.2016.78\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we investigate insider information technology sabotage. After an analysis of over 1200 cases in our insider threat corpus, we identified 97 insider information technology sabotage cases that are found in public records. In all of our cases, the insider has pleaded guilty or was convicted in a courtroom. The majority of the cases are (United States) domestic. We begin by providing an introduction to the problem space. Next, we provide an abridged case summary for a sample of the cases. Based on all of the cases, we perform an analysis to answer the following research questions: 1) Who are the insiders that commit insider information technology sabotage? 2) What is the motivation behind the insider attacking? 3) What technical means were used to launch the attack? 4) How were the insiders caught? 5) What damage did they cause? 6) What sentence did the insider receive? Lastly, we describe our aggregated results and provide best practices to help mitigate the type of insider threat we describe.\",\"PeriodicalId\":216417,\"journal\":{\"name\":\"2016 11th International Conference on Availability, Reliability and Security (ARES)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 11th International Conference on Availability, Reliability and Security (ARES)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ARES.2016.78\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 11th International Conference on Availability, Reliability and Security (ARES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ARES.2016.78","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

摘要

本文主要研究内幕信息技术破坏。在对我们的内部威胁语库中的1200多个案例进行分析后,我们在公共记录中发现了97个内部信息技术破坏案例。在我们所有的案件中,内部人员都已经认罪或在法庭上被定罪。大多数病例是(美国)国内的。我们首先介绍问题空间。接下来,我们将为案例样本提供一个简短的案例摘要。基于这些案例,我们对以下研究问题进行了分析:1)实施内幕信息技术破坏的内部人员是谁?2)内部攻击的动机是什么?3)发动攻击的技术手段是什么?4)内部人士是怎么被抓的?他们造成了什么损害?6)内部人被判了什么刑?最后,我们描述了我们的汇总结果,并提供了帮助减轻我们所描述的内部威胁类型的最佳实践。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Threat from Within: Case Studies of Insiders Who Committed Information Technology Sabotage
In this paper, we investigate insider information technology sabotage. After an analysis of over 1200 cases in our insider threat corpus, we identified 97 insider information technology sabotage cases that are found in public records. In all of our cases, the insider has pleaded guilty or was convicted in a courtroom. The majority of the cases are (United States) domestic. We begin by providing an introduction to the problem space. Next, we provide an abridged case summary for a sample of the cases. Based on all of the cases, we perform an analysis to answer the following research questions: 1) Who are the insiders that commit insider information technology sabotage? 2) What is the motivation behind the insider attacking? 3) What technical means were used to launch the attack? 4) How were the insiders caught? 5) What damage did they cause? 6) What sentence did the insider receive? Lastly, we describe our aggregated results and provide best practices to help mitigate the type of insider threat we describe.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信