Risk Assessment Method For Insider Threats In Cyber Security : A Review
Today’s in manufacturing major challenge is to manage large scale of cybersecurity system,which is potentially exposed to a multitude of threats.The utmost risky threats are insider threats.An insider threat arises when a person authorized to perform certain movements in an organization decides to...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Science and Information Organization
2018
|
Subjects: | |
Online Access: | http://eprints.utem.edu.my/id/eprint/23023/2/2018%20Risk%20Assessment%20Method%20for%20Insider%20Threats%20in%20Cyber%20Security-A%20Review.pdf http://eprints.utem.edu.my/id/eprint/23023/ https://thesai.org/Publications/ViewPaper?Volume=9&Issue=11&Code=IJACSA&SerialNo=19 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utem.eprints.23023 |
---|---|
record_format |
eprints |
spelling |
my.utem.eprints.230232021-07-23T16:04:32Z http://eprints.utem.edu.my/id/eprint/23023/ Risk Assessment Method For Insider Threats In Cyber Security : A Review Zainal Abidin, Zaheera Zakaria, Nurul Azma Hashim, Nurul Akmal Ahmad, Rabiah A. Perumal, Puvanasvaran T Technology (General) TA Engineering (General). Civil engineering (General) Today’s in manufacturing major challenge is to manage large scale of cybersecurity system,which is potentially exposed to a multitude of threats.The utmost risky threats are insider threats.An insider threat arises when a person authorized to perform certain movements in an organization decides to mishandle the trust and harm the organization.Therefore,to overcome these risks,this study evaluates various risk assessment method to assess the impact of insider threats and analyses the current gaps in risk assessment method.Based on the literature search done manually,we compare four methods which are NIST, FRAP,OCTAVE,and CRAMM.The result of the study shows that the most used by an organization is the NIST method.It is because NIST is a method that combines the involvement between human and system in term of collection data.The significance of this study contributes to developing a new method in analyzing the threats that can be used in any organization. Science and Information Organization 2018-11 Article PeerReviewed text en http://eprints.utem.edu.my/id/eprint/23023/2/2018%20Risk%20Assessment%20Method%20for%20Insider%20Threats%20in%20Cyber%20Security-A%20Review.pdf Zainal Abidin, Zaheera and Zakaria, Nurul Azma and Hashim, Nurul Akmal and Ahmad, Rabiah and A. Perumal, Puvanasvaran (2018) Risk Assessment Method For Insider Threats In Cyber Security : A Review. International Journal Of Advanced Computer Science And Applications, 9 (11). pp. 126-130. ISSN 2156-5570 https://thesai.org/Publications/ViewPaper?Volume=9&Issue=11&Code=IJACSA&SerialNo=19 DOI:10.14569/IJACSA.2018.091119 |
institution |
Universiti Teknikal Malaysia Melaka |
building |
UTEM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknikal Malaysia Melaka |
content_source |
UTEM Institutional Repository |
url_provider |
http://eprints.utem.edu.my/ |
language |
English |
topic |
T Technology (General) TA Engineering (General). Civil engineering (General) |
spellingShingle |
T Technology (General) TA Engineering (General). Civil engineering (General) Zainal Abidin, Zaheera Zakaria, Nurul Azma Hashim, Nurul Akmal Ahmad, Rabiah A. Perumal, Puvanasvaran Risk Assessment Method For Insider Threats In Cyber Security : A Review |
description |
Today’s in manufacturing major challenge is to manage large scale of cybersecurity system,which is potentially
exposed to a multitude of threats.The utmost risky threats are insider threats.An insider threat arises when a person authorized to perform certain movements in an organization decides to mishandle the trust and harm the organization.Therefore,to overcome these risks,this study evaluates various risk assessment method to assess the impact of insider threats and analyses the current gaps in risk assessment method.Based on the literature search done manually,we compare four methods which are NIST, FRAP,OCTAVE,and CRAMM.The result of the study shows that the most used by an organization is the NIST method.It is because NIST is a method that combines the involvement between human and system in term of collection data.The significance of this study contributes to developing a
new method in analyzing the threats that can be used in any organization. |
format |
Article |
author |
Zainal Abidin, Zaheera Zakaria, Nurul Azma Hashim, Nurul Akmal Ahmad, Rabiah A. Perumal, Puvanasvaran |
author_facet |
Zainal Abidin, Zaheera Zakaria, Nurul Azma Hashim, Nurul Akmal Ahmad, Rabiah A. Perumal, Puvanasvaran |
author_sort |
Zainal Abidin, Zaheera |
title |
Risk Assessment Method For Insider Threats In Cyber Security : A Review |
title_short |
Risk Assessment Method For Insider Threats In Cyber Security : A Review |
title_full |
Risk Assessment Method For Insider Threats In Cyber Security : A Review |
title_fullStr |
Risk Assessment Method For Insider Threats In Cyber Security : A Review |
title_full_unstemmed |
Risk Assessment Method For Insider Threats In Cyber Security : A Review |
title_sort |
risk assessment method for insider threats in cyber security : a review |
publisher |
Science and Information Organization |
publishDate |
2018 |
url |
http://eprints.utem.edu.my/id/eprint/23023/2/2018%20Risk%20Assessment%20Method%20for%20Insider%20Threats%20in%20Cyber%20Security-A%20Review.pdf http://eprints.utem.edu.my/id/eprint/23023/ https://thesai.org/Publications/ViewPaper?Volume=9&Issue=11&Code=IJACSA&SerialNo=19 |
_version_ |
1706960982600843264 |
score |
13.18916 |