Risk Assessment Method for Insider Threats in Cyber Security: A Review
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 11
Abstract
Today’s in manufacturing major challenge is to manage large scale of cybersecurity system, which is potentially exposed to a multitude of threats. The utmost risky threats are insider threats. An insider threat arises when a person authorized to perform certain movements in an organization decides to mishandle the trust and harm the organization. Therefore, to overcome these risks, this study evaluates various risk assessment method to assess the impact of insider threats and analyses the current gaps in risk assessment method. Based on the literature search done manually, we compare four methods which are NIST, FRAP, OCTAVE, and CRAMM. The result of the study shows that the most used by an organization is the NIST method. It is because NIST is a method that combines the involvement between human and system in term of collection data. The significance of this study contributes to developing a new method in analyzing the threats that can be used in any organization.
Authors and Affiliations
Nurul Akmal Hashim, Zaheera Zainal Abidin, A. P. Puvanasvaran, Nurul Azma Zakaria, Rabiah Ahmad
Variability Management in Business-IT Alignment: MDA based Approach
The expansion of PAIS (Process Aware Information Systems) has created the need for reuse in business processes. In fact, companies are left with directories containing several variants of the same business processes, whi...
Evaluation of APi Interface Design by Applying Cognitive Walkthrough
The usability evaluation of APi interface design was conducted through Cognitive Walkthrough method. APi is a mobile application game designed specifically for preschool children of Tabika Kemas Kampung Berawan, Limbang...
Localisation of Numerical Date Field in an Indian Handwritten Document
This paper describes a method to localise all those areas which may constitute the date field in an Indian handwritten document. Spatial patterns of the date field are studied from various handwritten documents and an al...
A particle swarm optimization algorithm for the continuous absolute p-center location problem with Euclidean distance
The p-center location problem is concerned with determining the location of p centers in a plane/space to serve n demand points having fixed locations. The continuous absolute p-center location problem attempts to locate...
Comparative Study from Several Business Cases and Methodologies for ICT Project Evaluation
Achieving high competitive advantage through Information and Communication Technologies (ICT) has never been easy without proper management and appropriate utilization of ICT resources. Therefore, the statistics suggeste...