Emerging Threats and Countermeasures in Cybersecurity
by Gulshan Shrivastava, Rudra Pratap Ojha, Shashank Awasthi, Kavita Sharma, Himani Bansal
13A Holistic Framework for Insider Threat Detection and Analysis Upon Security and Privacy for Data Management Services
A. Sheik Abdullah1*, Hanish Shyam1, Sriram B.1, Arif Ansari2 and Subramanian Selvakumar3
1School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu, India
2Department of Clinical Data Sciences and Operations, University of Southern California Marshall School of Business, Los Angeles, California, USA
3Department of Electrical and Computer Engineering, Bahir Dar Institute of Technology, Bahir Dar University, Bahir Dar, Ethiopia
Abstract
This chapter discusses the necessity for a comprehensive framework for Data Management Services and its associated challenges. It closely examines how the framework affects organizations when it comes to insider threats. It then delves into insider threats’ definitions, types, and indicators. Then, we look at identifying crucial assets and prioritizing them accordingly. After that, we look at how to manage insider risk, conduct risk assessment, and the process that needs to be duly followed. It is then followed by prioritizing risk and performing risk analysis and the process involved. The holistic framework is examined in detail covering administrative, technical, and physical aspects, including their scopes and relevant tools and approaches.
Keywords: Insider threat detection, risk analysis, data security, data organization, data mitigation, threat detection, data privacy