Detecting insider threats
The objective of this project is to come up with ways to recognize insider threats. An insider threat comes from within an organization where people such as former or current employees or business associates intend to inflict harm on the company. It is advantageous to be able to identify a person’s...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2016
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/67962 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-67962 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-679622023-07-07T17:03:32Z Detecting insider threats Lai, Rachel Tan Yap Peng School of Electrical and Electronic Engineering DRNTU::Engineering The objective of this project is to come up with ways to recognize insider threats. An insider threat comes from within an organization where people such as former or current employees or business associates intend to inflict harm on the company. It is advantageous to be able to identify a person’s ill intentions before it takes place. Thus this project focuses on analyzing the dynamics and networks of a company through its email exchanges. With the usage of R programming and Gephi, anomalies or unusual behaviour are identified and sought out. These anomalies may lead to uncovering an insider threat. Bachelor of Engineering 2016-05-23T08:35:05Z 2016-05-23T08:35:05Z 2016 Final Year Project (FYP) http://hdl.handle.net/10356/67962 en Nanyang Technological University 50 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering |
spellingShingle |
DRNTU::Engineering Lai, Rachel Detecting insider threats |
description |
The objective of this project is to come up with ways to recognize insider threats. An insider threat comes from within an organization where people such as former or current employees or business associates intend to inflict harm on the company. It is advantageous to be able to identify a person’s ill intentions before it takes place. Thus this project focuses on analyzing the dynamics and networks of a company through its email exchanges. With the usage of R programming and Gephi, anomalies or unusual behaviour are identified and sought out. These anomalies may lead to uncovering an insider threat. |
author2 |
Tan Yap Peng |
author_facet |
Tan Yap Peng Lai, Rachel |
format |
Final Year Project |
author |
Lai, Rachel |
author_sort |
Lai, Rachel |
title |
Detecting insider threats |
title_short |
Detecting insider threats |
title_full |
Detecting insider threats |
title_fullStr |
Detecting insider threats |
title_full_unstemmed |
Detecting insider threats |
title_sort |
detecting insider threats |
publishDate |
2016 |
url |
http://hdl.handle.net/10356/67962 |
_version_ |
1772828524006080512 |