Affiliation:
1. Louisiana Tech University, USA
2. Infosys Limited, USA
3. The State University of New York at Buffalo, USA
4. The University of Texas at San Antonio, USA
Abstract
Insider threat occurs when a person with legitimate access misuses his privileges and compromises the operations and security of a company. When an outsider tries to gain access to company data, it can often be managed or detected by having standard controls in place. However, when an insider who has rightful access to the data is involved, it can often go undetected. There has been a steady rise in the number of cases of insiders' threat related incidents in recent years. An insider could do this either for his own benefit or might be acting as an espionage to profit another individual or organization. Insider threat is prevalent in various forms across various disciplines and is a serious cause of concern for the operation of an organization and maintenance of trust of the customers. In this chapter, we will look at various forms of insider threats, some well-known insider threat cases, factors causing this kind of behavior, some of the key indicators and what organizations can do to deter the theft of intellectual property.
Reference35 articles.
1. Bishop, M., Gates, C., Frincke, D., & Greitzer, F. L. (2009). AZALIA: An A to Z Assessment of the Likelihood of Insider Attack. Paper presented at the Technologies for Homeland Security, 2009. HST'09. IEEE Conference on.
2. Blair, D. C., & Huntsman, J. M. (2013). The commission on the theft of American intellectual property. Retrieved from http://www.ipcommission.org/report/IP_Commission_Report_052213.pdf
3. Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness.;B.Bulgurcu;Management Information Systems Quarterly,2010
4. Colwill, C. (2009). Human factors in information security: The insider threat–Who can you trust these days? Information Security Technical Report, 14(4), 186-196.