ijact-book-coverT

Strengthening Insider Threat Monitoring Post Covid-19: Strategies and Tools

© 2023 by IJACT

Volume 1 Issue 2

Year of Publication : 2023

Author : Sabeeruddin Shaik

:10.56472/25838628/IJACT-V1I2P116

Citation :

Sabeeruddin Shaik, 2023. "Strengthening Insider Threat Monitoring Post Covid-19: Strategies and Tools" ESP International Journal of Advancements in Computational Technology (ESP-IJACT)  Volume 1, Issue 2: 149-152.

Abstract :

The pandemic has made companies adopt remote work policies and convert to cloud-based technologies. This adoption has helped the companies to continue the business without disruption, but this has also increased the risks for the companies. One of the critical risks among them is Insider Threats. Due to the Remote work option, employees can access the data without any surveillance monitoring. This privilege might lead to stealing or misuse of the data. This Paper will provide the Risks associated with the adoption of the Remote work Policy and Insider Threats. This Paper also provides a solution to mitigate these Insider threats by utilizing Robust Insider Threat monitoring tools to protect sensitive data and improve the Organization's security posture in this Hybrid work Model.

References :

[1] J. D. M. B. C. Probst, Insider Threats in Cybersecurity, springer, 2010.

[2] S. K. a. J.Lee, Managing Insier Threats: An Integrative approach, Information systems Research, 2013.

[3] e. al, A comprehenssive survey of data mining based fraud detection research, Artificial Intelligence Review, 2010.

[4] a. R. P.Cappelli, The CERT guide to Insider Threats, Addison Wilsey, 2012.

[5] e. al, Common sense guide to mitigating Insider Threats, Software Engineering Insitute, Carnegie Mellon University, 2013.

[6] E.Cole, Insider Threat: Protecting your organization from the Human point of failure, Syngress, 2014.

[7] J. a. T.Allen, Integrating Behaviour Analytics in Insider Threat Programs, IEEE Transactions on Security, 2016.

[8] R.K.Skopil, Finding the Blance:Data Privacy and Insider Threat, IEEE Security and Privacy, 2018.

[9] J. a. R.D.Flaherty, The EvolvingLandscape of Insider Threats, Computers and Security, 2019.

[10] L. a. S.Becker, Cultivating CybersecurityAwarness Among Employees, Information systems Journal, 2019.

Keywords :

Insider Threats, Remote Work, Cybersecurity, Post-Covid-19, Threat Monitoring, Behavioural Analytics, Zero Trust, Data Loss Prevention.