Risk Assessment Method for Insider Threats in Cyber Security: A Review

Abstract

Today’s in manufacturing major challenge is to manage large scale of cybersecurity system, which is potentially exposed to a multitude of threats. The utmost risky threats are insider threats. An insider threat arises when a person authorized to perform certain movements in an organization decides to mishandle the trust and harm the organization. Therefore, to overcome these risks, this study evaluates various risk assessment method to assess the impact of insider threats and analyses the current gaps in risk assessment method. Based on the literature search done manually, we compare four methods which are NIST, FRAP, OCTAVE, and CRAMM. The result of the study shows that the most used by an organization is the NIST method. It is because NIST is a method that combines the involvement between human and system in term of collection data. The significance of this study contributes to developing a new method in analyzing the threats that can be used in any organization.

Authors and Affiliations

Nurul Akmal Hashim, Zaheera Zainal Abidin, A. P. Puvanasvaran, Nurul Azma Zakaria, Rabiah Ahmad

Keywords

Related Articles

Traffic Sign Detection and Recognition using Features Combination and Random Forests

In this paper, we present a computer vision based system for fast robust Traffic Sign Detection and Recognition (TSDR), consisting of three steps. The first step consists on image enhancement and thresholding using the t...

Flood Analysis in Peru using Satellite Image: The Summer 2017 Case

At the beginning of the year 2017, different regions of Peru suffered from heavy rains mainly due to the 'El Niño' and 'La Niña' phenomena. As a result of these massive storms, several cities were affected by overflows a...

Image Retrieval System based on Color Global and Local Features Combined with GLCM for Texture Features

In CBIR (content-based image retrieval) features are extracted based on color, texture, and shape. There are many factors affecting the accuracy (precision) of retrieval such as number of features, type of features (loca...

Simulation of Performance Execution Procedure to Improve Seamless Vertical Handover in Heterogeneous Networks

One challenge of wireless networks integration is the ubiquitous wireless access abilities which provide the seamless handover for any moving communication device between different types of technologies (3GPP and non-3GP...

Classified Arabic Documents Using Semi-Supervised Technique

In this work, we test the performance of the Naïve Bayes classifier in the categorization of Arabic text. Arabic is rich and unique in its own way and has its own distinct features. The issues and characteristics of Arab...

Download PDF file
  • EP ID EP417617
  • DOI 10.14569/IJACSA.2018.091119
  • Views 85
  • Downloads 0

How To Cite

Nurul Akmal Hashim, Zaheera Zainal Abidin, A. P. Puvanasvaran, Nurul Azma Zakaria, Rabiah Ahmad (2018). Risk Assessment Method for Insider Threats in Cyber Security: A Review. International Journal of Advanced Computer Science & Applications, 9(11), 126-130. https://europub.co.uk/articles/-A-417617