Risk Assessment Method For Insider Threats In Cyber Security : A Review

Today’s in manufacturing major challenge is to manage large scale of cybersecurity system,which is potentially exposed to a multitude of threats.The utmost risky threats are insider threats.An insider threat arises when a person authorized to perform certain movements in an organization decides to...

Full description

Saved in:
Bibliographic Details
Main Authors: Zainal Abidin, Zaheera, Zakaria, Nurul Azma, Hashim, Nurul Akmal, Ahmad, Rabiah, A. Perumal, Puvanasvaran
Format: Article
Language:English
Published: Science and Information Organization 2018
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/23023/2/2018%20Risk%20Assessment%20Method%20for%20Insider%20Threats%20in%20Cyber%20Security-A%20Review.pdf
http://eprints.utem.edu.my/id/eprint/23023/
https://thesai.org/Publications/ViewPaper?Volume=9&Issue=11&Code=IJACSA&SerialNo=19
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utem.eprints.23023
record_format eprints
spelling my.utem.eprints.230232021-07-23T16:04:32Z http://eprints.utem.edu.my/id/eprint/23023/ Risk Assessment Method For Insider Threats In Cyber Security : A Review Zainal Abidin, Zaheera Zakaria, Nurul Azma Hashim, Nurul Akmal Ahmad, Rabiah A. Perumal, Puvanasvaran T Technology (General) TA Engineering (General). Civil engineering (General) Today’s in manufacturing major challenge is to manage large scale of cybersecurity system,which is potentially exposed to a multitude of threats.The utmost risky threats are insider threats.An insider threat arises when a person authorized to perform certain movements in an organization decides to mishandle the trust and harm the organization.Therefore,to overcome these risks,this study evaluates various risk assessment method to assess the impact of insider threats and analyses the current gaps in risk assessment method.Based on the literature search done manually,we compare four methods which are NIST, FRAP,OCTAVE,and CRAMM.The result of the study shows that the most used by an organization is the NIST method.It is because NIST is a method that combines the involvement between human and system in term of collection data.The significance of this study contributes to developing a new method in analyzing the threats that can be used in any organization. Science and Information Organization 2018-11 Article PeerReviewed text en http://eprints.utem.edu.my/id/eprint/23023/2/2018%20Risk%20Assessment%20Method%20for%20Insider%20Threats%20in%20Cyber%20Security-A%20Review.pdf Zainal Abidin, Zaheera and Zakaria, Nurul Azma and Hashim, Nurul Akmal and Ahmad, Rabiah and A. Perumal, Puvanasvaran (2018) Risk Assessment Method For Insider Threats In Cyber Security : A Review. International Journal Of Advanced Computer Science And Applications, 9 (11). pp. 126-130. ISSN 2156-5570 https://thesai.org/Publications/ViewPaper?Volume=9&Issue=11&Code=IJACSA&SerialNo=19 DOI:10.14569/IJACSA.2018.091119
institution Universiti Teknikal Malaysia Melaka
building UTEM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknikal Malaysia Melaka
content_source UTEM Institutional Repository
url_provider http://eprints.utem.edu.my/
language English
topic T Technology (General)
TA Engineering (General). Civil engineering (General)
spellingShingle T Technology (General)
TA Engineering (General). Civil engineering (General)
Zainal Abidin, Zaheera
Zakaria, Nurul Azma
Hashim, Nurul Akmal
Ahmad, Rabiah
A. Perumal, Puvanasvaran
Risk Assessment Method For Insider Threats In Cyber Security : A Review
description Today’s in manufacturing major challenge is to manage large scale of cybersecurity system,which is potentially exposed to a multitude of threats.The utmost risky threats are insider threats.An insider threat arises when a person authorized to perform certain movements in an organization decides to mishandle the trust and harm the organization.Therefore,to overcome these risks,this study evaluates various risk assessment method to assess the impact of insider threats and analyses the current gaps in risk assessment method.Based on the literature search done manually,we compare four methods which are NIST, FRAP,OCTAVE,and CRAMM.The result of the study shows that the most used by an organization is the NIST method.It is because NIST is a method that combines the involvement between human and system in term of collection data.The significance of this study contributes to developing a new method in analyzing the threats that can be used in any organization.
format Article
author Zainal Abidin, Zaheera
Zakaria, Nurul Azma
Hashim, Nurul Akmal
Ahmad, Rabiah
A. Perumal, Puvanasvaran
author_facet Zainal Abidin, Zaheera
Zakaria, Nurul Azma
Hashim, Nurul Akmal
Ahmad, Rabiah
A. Perumal, Puvanasvaran
author_sort Zainal Abidin, Zaheera
title Risk Assessment Method For Insider Threats In Cyber Security : A Review
title_short Risk Assessment Method For Insider Threats In Cyber Security : A Review
title_full Risk Assessment Method For Insider Threats In Cyber Security : A Review
title_fullStr Risk Assessment Method For Insider Threats In Cyber Security : A Review
title_full_unstemmed Risk Assessment Method For Insider Threats In Cyber Security : A Review
title_sort risk assessment method for insider threats in cyber security : a review
publisher Science and Information Organization
publishDate 2018
url http://eprints.utem.edu.my/id/eprint/23023/2/2018%20Risk%20Assessment%20Method%20for%20Insider%20Threats%20in%20Cyber%20Security-A%20Review.pdf
http://eprints.utem.edu.my/id/eprint/23023/
https://thesai.org/Publications/ViewPaper?Volume=9&Issue=11&Code=IJACSA&SerialNo=19
_version_ 1706960982600843264
score 13.18916