Insider risk profile matrix to quantify risk value of insider threat prediction framework

An insider threat refers to the threat arising from an individual inside an organization that maliciously leverages his or her system privileges, and closeness and proximity in a computerized environment to compromise valuable information and inflict harm. This scenario is an example of system viola...

Full description

Saved in:
Bibliographic Details
Main Authors: Ismail, I., Hassan, R., Othman, M. R., Ahmad, A. S., Tawfiq, N. E.
Format: Article
Language:English
Published: Asian Research Publishing Network 2017
Online Access:http://eprints.utm.my/id/eprint/76647/1/IszaidaIsmail2017_InsiderRiskProfileMatrixToQuantify.pdf
http://eprints.utm.my/id/eprint/76647/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85031714406&partnerID=40&md5=009d5dbc4ba46463e7871242b169963f
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
Language: English
id my.utm.76647
record_format eprints
spelling my.utm.766472018-10-14T08:37:24Z http://eprints.utm.my/id/eprint/76647/ Insider risk profile matrix to quantify risk value of insider threat prediction framework Ismail, I. Hassan, R. Othman, M. R. Ahmad, A. S. Tawfiq, N. E. An insider threat refers to the threat arising from an individual inside an organization that maliciously leverages his or her system privileges, and closeness and proximity in a computerized environment to compromise valuable information and inflict harm. This scenario is an example of system violation that decreases the degree of system trustworthiness. Most cases of system trustworthiness use a peer judgment formulation, which may involve bias sentiments towards document sensitivity values. Moreover, audit trails of risky document navigation paths are important as an alarm to indicate any violation. Therefore, this study presents a combination of the trust criteria and document sensitivity level of an insider to obtain a risk value, which will be used to predict the occurrence of an insider threat. This study begins by investigating the prominent attributes of insiders with a focus on their degree of experience and skill in line with system trust. Subsequently, these prominent attributes are used to construct an insider Trust Profile Matrix (TPM). From the TPM, the trust value is calculated and combined with the sensitivity value of each document to produce a Risk Matrix (RM). As a result, (i) risk value and (ii) prediction rate and risky path are then calculated and analyzed using an Insider Threat Prediction Framework as an alarm for violation occurrence. Asian Research Publishing Network 2017 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/76647/1/IszaidaIsmail2017_InsiderRiskProfileMatrixToQuantify.pdf Ismail, I. and Hassan, R. and Othman, M. R. and Ahmad, A. S. and Tawfiq, N. E. (2017) Insider risk profile matrix to quantify risk value of insider threat prediction framework. Journal of Theoretical and Applied Information Technology, 95 (19). pp. 5090-5103. ISSN 1992-8645 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85031714406&partnerID=40&md5=009d5dbc4ba46463e7871242b169963f
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
description An insider threat refers to the threat arising from an individual inside an organization that maliciously leverages his or her system privileges, and closeness and proximity in a computerized environment to compromise valuable information and inflict harm. This scenario is an example of system violation that decreases the degree of system trustworthiness. Most cases of system trustworthiness use a peer judgment formulation, which may involve bias sentiments towards document sensitivity values. Moreover, audit trails of risky document navigation paths are important as an alarm to indicate any violation. Therefore, this study presents a combination of the trust criteria and document sensitivity level of an insider to obtain a risk value, which will be used to predict the occurrence of an insider threat. This study begins by investigating the prominent attributes of insiders with a focus on their degree of experience and skill in line with system trust. Subsequently, these prominent attributes are used to construct an insider Trust Profile Matrix (TPM). From the TPM, the trust value is calculated and combined with the sensitivity value of each document to produce a Risk Matrix (RM). As a result, (i) risk value and (ii) prediction rate and risky path are then calculated and analyzed using an Insider Threat Prediction Framework as an alarm for violation occurrence.
format Article
author Ismail, I.
Hassan, R.
Othman, M. R.
Ahmad, A. S.
Tawfiq, N. E.
spellingShingle Ismail, I.
Hassan, R.
Othman, M. R.
Ahmad, A. S.
Tawfiq, N. E.
Insider risk profile matrix to quantify risk value of insider threat prediction framework
author_facet Ismail, I.
Hassan, R.
Othman, M. R.
Ahmad, A. S.
Tawfiq, N. E.
author_sort Ismail, I.
title Insider risk profile matrix to quantify risk value of insider threat prediction framework
title_short Insider risk profile matrix to quantify risk value of insider threat prediction framework
title_full Insider risk profile matrix to quantify risk value of insider threat prediction framework
title_fullStr Insider risk profile matrix to quantify risk value of insider threat prediction framework
title_full_unstemmed Insider risk profile matrix to quantify risk value of insider threat prediction framework
title_sort insider risk profile matrix to quantify risk value of insider threat prediction framework
publisher Asian Research Publishing Network
publishDate 2017
url http://eprints.utm.my/id/eprint/76647/1/IszaidaIsmail2017_InsiderRiskProfileMatrixToQuantify.pdf
http://eprints.utm.my/id/eprint/76647/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85031714406&partnerID=40&md5=009d5dbc4ba46463e7871242b169963f
_version_ 1643657370045251584