Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider
A range of international regulatory documents state the importance of counteracting insiders, especially cyber-insiders, in critical facilities and simultaneously providing complex protection, which includes technical, administrative and information protection. In that case the insider, who is fami...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
ITB Journal Publisher
2015-07-01
|
Series: | Journal of ICT Research and Applications |
Online Access: | http://journals.itb.ac.id/index.php/jictra/article/view/576 |
id |
doaj-da053cb1e5dc44f8afc8500685b7adea |
---|---|
record_format |
Article |
spelling |
doaj-da053cb1e5dc44f8afc8500685b7adea2020-11-24T23:05:09ZengITB Journal PublisherJournal of ICT Research and Applications2337-57872338-54992015-07-018325126910.5614/itbj.ict.res.appl.2015.8.3.5896Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the InsiderSergey Igorevich Zhurin0National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), Kashirskoye Highway 31, 115409, MoscowA range of international regulatory documents state the importance of counteracting insiders, especially cyber-insiders, in critical facilities and simultaneously providing complex protection, which includes technical, administrative and information protection. In that case the insider, who is familiar with the protection or information system, will be able to find vulnerabilities and weak points in the protection of the information system or control system. One of the most important aspects of the preventive measures against insiders is personnel checks using different techniques, including interviews, social network analysis, and local area network analysis. In the case of having limited financial resources, it is necessary to choose a technique from a checklist rationally.http://journals.itb.ac.id/index.php/jictra/article/view/576 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Sergey Igorevich Zhurin |
spellingShingle |
Sergey Igorevich Zhurin Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider Journal of ICT Research and Applications |
author_facet |
Sergey Igorevich Zhurin |
author_sort |
Sergey Igorevich Zhurin |
title |
Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider |
title_short |
Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider |
title_full |
Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider |
title_fullStr |
Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider |
title_full_unstemmed |
Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider |
title_sort |
comprehensiveness of response to internal cyber-threat and selection of methods to identify the insider |
publisher |
ITB Journal Publisher |
series |
Journal of ICT Research and Applications |
issn |
2337-5787 2338-5499 |
publishDate |
2015-07-01 |
description |
A range of international regulatory documents state the importance of counteracting insiders, especially cyber-insiders, in critical facilities and simultaneously providing complex protection, which includes technical, administrative and information protection. In that case the insider, who is familiar with the protection or information system, will be able to find vulnerabilities and weak points in the protection of the information system or control system. One of the most important aspects of the preventive measures against insiders is personnel checks using different techniques, including interviews, social network analysis, and local area network analysis. In the case of having limited financial resources, it is necessary to choose a technique from a checklist rationally. |
url |
http://journals.itb.ac.id/index.php/jictra/article/view/576 |
work_keys_str_mv |
AT sergeyigorevichzhurin comprehensivenessofresponsetointernalcyberthreatandselectionofmethodstoidentifytheinsider |
_version_ |
1725627240514846720 |