Human-insider Threat Analysis for the Purpose of Modeling

I.V. Kotsiuba, post-graduate
Pukhov Institute for Modeling in Energy Engineering of NAS of Ukraine
(15, General Naumov St., Kyiv, 03164, Ukraine
e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.)

Èlektron. model. 2018, 38(3):99-108
https://doi.org/10.15407/emodel.38.03.099

ABSTRACT

This article presents the definition of the insider threat and its impact; it also provides an overview of techniques to control and remediate these threats.

KEYWORDS

insider threat, integrity, BYOD, vulnerability.

REFERENCES

1. Zegzhda P.D. and Rudina Å.À. (2008), Osnovy informatsionnoy bezopasnosti [Fundamentals of information security], Politechnicheskiy Institut, S. Petersburg, Russia.
2. Kravtsov, H., Kotsiuba, I. and Prytulyuk, I. (2015), “The cybersecurity modeling in critical infrastructures”, Elektronnoe modelirovanie, no. 4, pp 75-84.
3. Skiba, V.Y. and Kurbatov, V.A. (2008), Rukovodstvo po zaschite ot vnutrennikh ugroz informatsionnoi bezopasnosti [Inside information threat prevention manual], Piter, S. Petersburg, Russia.
4. Stolfo, S.J., Bellovin, S.M. and Hershkop, S. (2008), Insider attack and cyber security beyond the hacker, California, Springer, USA.

Full text: PDF (in Russian)