Risk Assessment Method For Insider Threats In Cyber Security : A Review
Today’s in manufacturing major challenge is to manage large scale of cybersecurity system,which is potentially exposed to a multitude of threats.The utmost risky threats are insider threats.An insider threat arises when a person authorized to perform certain movements in an organization decides to...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Science and Information Organization
2018
|
Subjects: | |
Online Access: | http://eprints.utem.edu.my/id/eprint/23023/2/2018%20Risk%20Assessment%20Method%20for%20Insider%20Threats%20in%20Cyber%20Security-A%20Review.pdf http://eprints.utem.edu.my/id/eprint/23023/ https://thesai.org/Publications/ViewPaper?Volume=9&Issue=11&Code=IJACSA&SerialNo=19 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Today’s in manufacturing major challenge is to manage large scale of cybersecurity system,which is potentially
exposed to a multitude of threats.The utmost risky threats are insider threats.An insider threat arises when a person authorized to perform certain movements in an organization decides to mishandle the trust and harm the organization.Therefore,to overcome these risks,this study evaluates various risk assessment method to assess the impact of insider threats and analyses the current gaps in risk assessment method.Based on the literature search done manually,we compare four methods which are NIST, FRAP,OCTAVE,and CRAMM.The result of the study shows that the most used by an organization is the NIST method.It is because NIST is a method that combines the involvement between human and system in term of collection data.The significance of this study contributes to developing a
new method in analyzing the threats that can be used in any organization. |
---|