Rich, Eliot with Ignacio Martinez-Moyano, Stephen Conrad, Dawn Cappelli, Andrew Moore, Timothy Shimeall, David Andersen, Jose Gonzalez, Robert Ellison, Howard Lipson, David Mundie, Jose Mari Sarriegi, Agata Sawicka, Thomas Stewart, José Manuel Torres, Johannes Wiik and Elise Weaver, "Simulating Insider Cyber-Threat Risks: A Model-Based Case and a Case-Based Model", 2005 July 17-2005 July 21

ua435

The growing reliance on technological infrastructures has made organizations increasingly vulnerable to threats from erstwhile trusted employees and clients. Recent research indicates that successful defense from these threats depends on both technical and behavioral solutions. In this paper, we report on our work to identify seemingly reasonable organizational actions that may inadvertently lead to increased risk exposure. We also consider how potential internal attackers may be encouraged or discouraged by monitoring the organizational responses to probes of the firm’s security systems. Two interwoven work products are presented: A case study that presents a particular type of insider threat – long-term fraud – and a simulation model that supports the case, the underlying dynamic theory, and examination of policy options. The case and model combine to produce a motivating and useful exercise that illustrates the problems of insider cyber-threats. This material has been used in teaching of insider threat issues with satisfactory results.

This is the whole item.

Date created
  • 2005 July 17-2005 July 21
Type
Processing Activity License

ITEM CONTEXT

Part of

cc5bb0ac12a5b68b26b1583548898dae

Scope and Contents
Part of

3c582e6f5cf305ef0030c7471b499022

Scope and Contents
Part of

23d738ba88f8333bc39725f9cb5bd0b8

Scope and Contents
Collection

System Dynamic Society Records

Scope and Contents
Collecting area

Items