2011
DOI: 10.5121/ijnsa.2011.3301
|View full text |Cite
|
Sign up to set email alerts
|

System Dynamics Based Insider Threats Modeling

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…The mapping of the dynamic complexity of cyberattacks is illustrated in Table 2 to evidence the link between SD and APT attacks. SD has been used in many studies to model information security management and attacks (Nazareth & Choi, 2015;Yang & Wang, 2011). SD runs through six phases: systems description, converting description to equations, simulating the model, designing alternative policies and structures, educating and debating, and implementing changes in policies (Forrester, 1994).…”
Section: System Dynamics Applicationsmentioning
confidence: 99%
“…The mapping of the dynamic complexity of cyberattacks is illustrated in Table 2 to evidence the link between SD and APT attacks. SD has been used in many studies to model information security management and attacks (Nazareth & Choi, 2015;Yang & Wang, 2011). SD runs through six phases: systems description, converting description to equations, simulating the model, designing alternative policies and structures, educating and debating, and implementing changes in policies (Forrester, 1994).…”
Section: System Dynamics Applicationsmentioning
confidence: 99%
“…As Bishop et al (2008) affirms, if we cannot define the insider threat problem and its underlying factors properly, then we will not be able to come up with a solution. In addition, we can assert that combining insider monitoring mechanisms with overall risk control may increase the probability of detecting insider threats (Yang & Wang, 2011).…”
Section: Conclusion and Suggestions For Future Researchmentioning
confidence: 99%
“…While these theories are comprehensive and well-researched, they fall firmly within the realm of social science and cannot be independently tested and verified in the same way as a scientific theory. The second form of research comes from the Computer Science discipline, which focuses on the related topic of corporate espionage and particularly insider and outsider threats [8] [9]. However, comprehensive models of the complexities of information and cyber warfare have not previously been attempted, in part because computer scientists are more interested in simulating the attack patterns of computer viruses than the socio-political phenomena which lead to cyber conflict.…”
Section: Introductionmentioning
confidence: 99%