I.V. Kotsiuba, post-graduate
Pukhov Institute for Modeling in Energy Engineering of NAS of Ukraine
(15, General Naumov St., Kyiv, 03164, Ukraine
e-mail:
Èlektron. model. 2018, 38(3):99-108
https://doi.org/10.15407/emodel.38.03.099
ABSTRACT
This article presents the definition of the insider threat and its impact; it also provides an overview of techniques to control and remediate these threats.
KEYWORDS
insider threat, integrity, BYOD, vulnerability.
REFERENCES
1. Zegzhda P.D. and Rudina Å.À. (2008), Osnovy informatsionnoy bezopasnosti [Fundamentals of information security], Politechnicheskiy Institut, S. Petersburg, Russia.
2. Kravtsov, H., Kotsiuba, I. and Prytulyuk, I. (2015), “The cybersecurity modeling in critical infrastructures”, Elektronnoe modelirovanie, no. 4, pp 75-84.
3. Skiba, V.Y. and Kurbatov, V.A. (2008), Rukovodstvo po zaschite ot vnutrennikh ugroz informatsionnoi bezopasnosti [Inside information threat prevention manual], Piter, S. Petersburg, Russia.
4. Stolfo, S.J., Bellovin, S.M. and Hershkop, S. (2008), Insider attack and cyber security beyond the hacker, California, Springer, USA.