Insiders and Insider Threats –

An Overview of Definitions and Mitigation Techniques

 

Jeffrey Hunker1 and Christian W. Probst2

 

1Jeffrey Hunker Associates LLC

hunker@jeffreyhunker.com

 

2 Technical University of Denmark

Richard Petersens Plads

Building 322, Room 117

DK-2800 Kongens Lyngby

Denmark

probst@imm.dtu.dk

 

 

Abstract

 

Threats from the inside of an organization¡¯s perimeters are a significant problem, since it is difficult

to distinguish them from benign activity. In this overview article we discuss defining properties

of insiders and insider threats. After presenting definitions of these terms,

we go on to discuss a number of approaches from the technological, the sociological,

and the socio-technical domain. We draw two main conclusions. Tackling insider threats requires

a combination of techniques from the technical, the sociological, and the socio-technical domain,

to enable qualified detection of threats, and their mitigation. Another important observation is

that the distinction between insiders and outsiders seems to lose significance

as IT infrastructure is used in performing insider attacks

 

Keywords: insiders, insider threats, managing the risk of insider threats

 

Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA),

Vol. 2, No. 1, pp. 4-27, June 2011 [pdf]