Abstract
Cyber exploitation and malicious activities have become more sophisticated. Insider threat is one of the most significant cyber security threat vector, while posing a great concern to corporations and governments. An overview of the fundamental motivating forces and motivation theory are discussed. Such overview is provided to identify motivations that lead trusted employees to become insider threats in the context of cyber security. A research agenda with two sequential experimental research studies are outlined to address the challenge of insider threat mitigation by a prototype development. The first proposed study will classify data intake feeds, as recognized and weighted by cyber security experts, in an effort to establish predictive analytics of novel correlations of activities that may lead to cyber security incidents. It will also develop approach to identify how user activities can be compared against an established baseline, the user’s network cyber security pulse, with visualization of simulated users’ activities. Additionally, the second study will explain the process of assessing the usability of a developed visualization prototype that intends to present correlated suspicious activities requiring immediate action. Successfully developing the proposed prototype via feeds aggregation and an advanced visualization from the proposed research could assist in the mitigation of malicious insider threat.
| Original language | American English |
|---|---|
| State | Published - Jan 1 2016 |
| Event | Knowledge Management Conference 2016 - Duration: Jan 1 2016 → … |
Conference
| Conference | Knowledge Management Conference 2016 |
|---|---|
| Period | 1/1/16 → … |
Keywords
- Insider threat
- cybersecurity
- cybersecurity simulation
- data visualization in cybersecurity
- malicious insider detection
- motivation
- proposed experimental research in cybersecurity
Disciplines
- Computer Sciences
Fingerprint
Dive into the research topics of 'Exploring the motivation behind cybersecurity insider threat and proposed research agenda'. Together they form a unique fingerprint.Cite this
- APA
- Standard
- Harvard
- Vancouver
- Author
- BIBTEX
- RIS