...
首页> 外文期刊>Journal of computer sciences >An Investigation into Information Security Threats from Insiders and how to Mitigate them: A Case Study of Zambian Public Sector
【24h】

An Investigation into Information Security Threats from Insiders and how to Mitigate them: A Case Study of Zambian Public Sector

机译:内部人员的信息安全威胁及其缓解方法的调查:以赞比亚公共部门为例

获取原文
           

摘要

Insider attacks are security breaches posed by an existing or former organizational stakeholder with unrestricted access rights to the resources who, with or without intent, compromises the confidentiality, integrity and availability of organizational data. Zambian public organizations are vulnerable to insider attacks due to a number of factors that include; technology complexity, understaffing, financial gains, lack of security policies and procedures, lack of adoption and implementation of international security frameworks and standards such as ISO 27000 and COBIT. Insider threats can be categorized into three dimensions namely; Information Technology (IT) Sabotage, Financial Fraud and Intellectual Property (IP) theft. This paper reports the results from three targeted public organizations in Zambia. These are among the few that seem to recognised cyber threats and have partially adopted some parts of security base practices and international information security standards such as COBIT 5.0 and ISO 27001 standard. The study aimed at assessing the security GAPs using ISO 27001:2013 Information Security Management System (ISMS) standard. The study approach used was quantitative and qualitative with survey questionnaires and interviews as assessment tools for empirical data collection. The study shows that Zambian public sector has related challenges in mitigation of insider attacks that calls for considered efforts in developing measures for mitigation of these challenges in order to ensure national cyber security readiness and enhancing data privacy. The study reviewed that majority of the organizations assessed lack insider security deterring policies such as access control, non-disclosure agreements (NDA), pre-employment screening and unacceptable use. Additionally, the findings indicated that majority of public organizations have not made any efforts towards cyber security readiness, while only about 33% have adopted some security base practices. Further, using Actor Network Theory (ANT) and Theory of Planned Behavior (TPB), the study proposed an expedient insider mitigation model with an emphasis on user awareness and access control considering that it is difficult to model human behavior.
机译:内部攻击是由现有或以前的组织利益相关者构成的安全漏洞,对资源的访问权限不受限制,这些资源有意或无意破坏了组织数据的机密性,完整性和可用性。赞比亚的公共组织由于多种因素而容易受到内部攻击。技术复杂性,人员配备不足,财务收益,缺乏安全政策和程序,缺乏采用和实施国际安全框架和标准(例如ISO 27000和COBIT)的情况。内部威胁可以分为三个方面:信息技术(IT)破坏,金融欺诈和知识产权(IP)盗窃。本文报告了赞比亚三个有针对性的公共组织的结果。这些是少数似乎可以识别网络威胁并部分采用了安全基础实践和国际信息安全标准(例如COBIT 5.0和ISO 27001标准)的某些部分。该研究旨在使用ISO 27001:2013信息安全管理系统(ISMS)标准评估安全GAP。所使用的研究方法是定量和定性的,其中调查问卷和访谈作为评估经验数据的评估工具。该研究表明,赞比亚公共部门在缓解内部攻击方面面临着相关挑战,要求在制定缓解这些挑战的措施方面进行认真的努力,以确保国家网络安全就绪并增强数据隐私。该研究回顾了大多数组织评估的缺乏内部安全性的威慑政策,例如访问控制,保密协议(NDA),职前筛选和不可接受的使用。此外,调查结果表明,大多数公共组织都没有为网络安全做好任何准备,而只有约33%的组织采取了一些安全基础措施。此外,使用Actor网络理论(ANT)和计划行为理论(TPB),该研究提出了一种权宜之计的内部人员缓解模型,其中重点在于用户意识和访问控制,因为它很难模拟人类行为。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号