Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider

A range of international regulatory documents state the importance of counteracting insiders, especially cyber-insiders, in  critical facilities and simultaneously providing complex protection, which includes technical, administrative and information protection. In that case the insider, who is fami...

Full description

Bibliographic Details
Main Author: Sergey Igorevich Zhurin
Format: Article
Language:English
Published: ITB Journal Publisher 2015-07-01
Series:Journal of ICT Research and Applications
Online Access:http://journals.itb.ac.id/index.php/jictra/article/view/576
id doaj-da053cb1e5dc44f8afc8500685b7adea
record_format Article
spelling doaj-da053cb1e5dc44f8afc8500685b7adea2020-11-24T23:05:09ZengITB Journal PublisherJournal of ICT Research and Applications2337-57872338-54992015-07-018325126910.5614/itbj.ict.res.appl.2015.8.3.5896Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the InsiderSergey Igorevich Zhurin0National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), Kashirskoye Highway 31, 115409, MoscowA range of international regulatory documents state the importance of counteracting insiders, especially cyber-insiders, in  critical facilities and simultaneously providing complex protection, which includes technical, administrative and information protection. In that case the insider, who is familiar with the protection or information system, will be able to find vulnerabilities and weak points in the protection of the information system or control system. One of the most important aspects of the preventive measures against insiders is personnel checks using different techniques, including interviews, social network analysis, and local area network analysis. In the case of having limited financial resources, it is necessary to choose a technique from a checklist rationally.http://journals.itb.ac.id/index.php/jictra/article/view/576
collection DOAJ
language English
format Article
sources DOAJ
author Sergey Igorevich Zhurin
spellingShingle Sergey Igorevich Zhurin
Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider
Journal of ICT Research and Applications
author_facet Sergey Igorevich Zhurin
author_sort Sergey Igorevich Zhurin
title Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider
title_short Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider
title_full Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider
title_fullStr Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider
title_full_unstemmed Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider
title_sort comprehensiveness of response to internal cyber-threat and selection of methods to identify the insider
publisher ITB Journal Publisher
series Journal of ICT Research and Applications
issn 2337-5787
2338-5499
publishDate 2015-07-01
description A range of international regulatory documents state the importance of counteracting insiders, especially cyber-insiders, in  critical facilities and simultaneously providing complex protection, which includes technical, administrative and information protection. In that case the insider, who is familiar with the protection or information system, will be able to find vulnerabilities and weak points in the protection of the information system or control system. One of the most important aspects of the preventive measures against insiders is personnel checks using different techniques, including interviews, social network analysis, and local area network analysis. In the case of having limited financial resources, it is necessary to choose a technique from a checklist rationally.
url http://journals.itb.ac.id/index.php/jictra/article/view/576
work_keys_str_mv AT sergeyigorevichzhurin comprehensivenessofresponsetointernalcyberthreatandselectionofmethodstoidentifytheinsider
_version_ 1725627240514846720