Risk Assessment Method for Insider Threats in Cyber Security: A Review

Abstract

Today’s in manufacturing major challenge is to manage large scale of cybersecurity system, which is potentially exposed to a multitude of threats. The utmost risky threats are insider threats. An insider threat arises when a person authorized to perform certain movements in an organization decides to mishandle the trust and harm the organization. Therefore, to overcome these risks, this study evaluates various risk assessment method to assess the impact of insider threats and analyses the current gaps in risk assessment method. Based on the literature search done manually, we compare four methods which are NIST, FRAP, OCTAVE, and CRAMM. The result of the study shows that the most used by an organization is the NIST method. It is because NIST is a method that combines the involvement between human and system in term of collection data. The significance of this study contributes to developing a new method in analyzing the threats that can be used in any organization.

Authors and Affiliations

Nurul Akmal Hashim, Zaheera Zainal Abidin, A. P. Puvanasvaran, Nurul Azma Zakaria, Rabiah Ahmad

Keywords

Related Articles

A Comparative Study of Databases with Different Methods of Internal Data Management

The purpose of this paper is to present a comparative study between a non-relational MongoDB database and a relational Microsoft SQL Server database in the case of an unstructured representation of data, in XML or JSON f...

Machine Learning Approaches for Predicting the Severity Level of Software Bug Reports in Closed Source Projects

In Software Development Life Cycle, fixing defect bugs is one of the essential activities of the software maintenance phase. Bug severity indicates how major or minor the bug impacts on the execution of the system and ho...

Localization and Monitoringo of Public Transport Services Based on Zigbee

Regular and systematic public transport is of great importance to all residents in any country, in the city and on commuter routes. In our environment, users of public transport can track the movement of vehicles with gr...

Using an MPI Cluster in the Control of a Mobile Robots System

Recently, HPC (High Performance Computing) systems have gone from supercomputers to clusters. The clusters are used in all tasks that require very high computing power such as weather forecasting, climate research, molec...

Energy-Aware Virtual Network Embedding Approach for Distributed Cloud

Network virtualization has caught the attention of many researchers in recent years. It facilitates the process of creating several virtual networks over a single physical network. Despite this advantage, however, networ...

Download PDF file
  • EP ID EP417617
  • DOI 10.14569/IJACSA.2018.091119
  • Views 71
  • Downloads 0

How To Cite

Nurul Akmal Hashim, Zaheera Zainal Abidin, A. P. Puvanasvaran, Nurul Azma Zakaria, Rabiah Ahmad (2018). Risk Assessment Method for Insider Threats in Cyber Security: A Review. International Journal of Advanced Computer Science & Applications, 9(11), 126-130. https://europub.co.uk/articles/-A-417617