Insider threats pose significant challenges to any organization. Many solutions have been proposed in the past to detect insider threats. Unfortunately, given the complexity of the problem and the human factors involved, many solutions which have been proposed face strict constraints and limitations when it comes to the working environment. As a result, many past insider threat solutions have in practice failed in their implementations. In this work, we review some of the recent insider threat detection solutions and explore their benefits and limitations. We also discuss insider threat issues for emerging areas such as cloud computing, virtualization, and social networking.
|Number of pages||10|
|Journal||Information Security Journal|
|State||Published - Apr 2012|
Bibliographical noteFunding Information:
This work was supported by a grant from the National Science Foundation (Grant NSF Award No 0911969). We thank Michael Pearce for his useful comments and feedback on early drafts of this paper. We would also like to express our gratitude to the anonymous reviewers for their comments and suggestions which helped us to improve the quality and presentation of this paper.
- Information security and risk management
- Operations security
- Telecommunications and network security threats
ASJC Scopus subject areas
- Computer Science Applications
- Information Systems and Management