Emerging Threats and Countermeasures in Cybersecurity
by Gulshan Shrivastava, Rudra Pratap Ojha, Shashank Awasthi, Kavita Sharma, Himani Bansal
12Insider Threat Detection and Prevention: New Approaches and Tools
Rakhi S.1, Sampada H. K.1, Arun Balodi2*, Shobha P. C.1 and Roshan Kumar3
1Department of ECE, Atria Institute of Technology, Bangalore, Karnataka, India
2Department of ECE, Dayananda Sagar University, Bangalore, Karnataka, India
3Department of Electronic and IT, Miami College of Henan University, Kaifeng, Henan, China
Abstract
Insider threats are those that have authorized access to a network and utilize it to harm an organization in the current digital landscape. Organizations should establish a comprehensive and multilayered security plan that integrates technology, processes, and human awareness to reduce the risk of insider threats effectively. This chapter reviews many strategies and safeguards against insider attacks. Behavior-based anomaly detection, privileged access management, artificial intelligence (AI) and machine learning, context-aware access control, secure data aggregation, intrusion detection systems, security awareness, and training are a few techniques to detect and prevent insider attacks. It is important to emphasize that different approaches and technologies may be implemented differently based on the specific demands and constraints of the organizations. Furthermore, new tactics and technologies are continuously being developed in cybersecurity research and development to counter insider threats successfully. This chapter describes the insider danger and offers strategies for seeing, ...