DocumentCode :
3293862
Title :
Insider Threat Security Reference Architecture
Author :
Montelibano, Joji ; Moore, Andrew
fYear :
2012
fDate :
4-7 Jan. 2012
Firstpage :
2412
Lastpage :
2421
Abstract :
The Insider Threat Security Reference Architecture, ITSRA, provides an enterprise wide solution to insider threat. The architecture consists of four security layers - Business, Information, Data, and Application. Organizations should deploy and enforce controls at each layer in order to address insider attacks. Each layer does not function in isolation or independently of other layers. Rather, the correlation of indicators and application of controls across all four layers forms the crux of this approach. Based on empirical data consisting of over 600 cases of insider crimes, insider attacks proved successful in inflicting damage when an organization failed to implement adequate controls in any of three security principles - authorized access, acceptable use, and continuous monitoring. The ITSRA draws from existing best practices and standards as well as from analysis of these cases to provide actionable guidance for organizations to improve their posture against the insider threat.
Keywords :
security of data; ITSRA; application; business; data; information; insider attacks; insider crimes; insider threat security reference architecture; Correlation; Databases; Monitoring; Organizations; Security; Standards organizations; Architecture; Insider Threat; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
System Science (HICSS), 2012 45th Hawaii International Conference on
Conference_Location :
Maui, HI
ISSN :
1530-1605
Print_ISBN :
978-1-4577-1925-7
Electronic_ISBN :
1530-1605
Type :
conf
DOI :
10.1109/HICSS.2012.327
Filename :
6149307
Link To Document :
بازگشت