Next Article in Journal
3D-MRI Brain Tumor Detection Model Using Modified Version of Level Set Segmentation Based on Dragonfly Algorithm
Next Article in Special Issue
Earth-to-Earth Microwave Rain Attenuation Measurements: A Survey On the Recent Literature
Previous Article in Journal
Formation of the Dynamic Energy Cascades in Quartic and Quintic Generalized KdV Equations
Previous Article in Special Issue
28 GHz Single-Chip Transmit RF Front-End MMIC for Multichannel 5G Wireless Communications
Open AccessArticle

Study on Inside Threats Based on Analytic Hierarchy Process

by and *
Department of Computer Science, Kyonggi University, 16227, Gyeonggi-do 154-42, Korea
*
Author to whom correspondence should be addressed.
Symmetry 2020, 12(8), 1255; https://doi.org/10.3390/sym12081255
Received: 19 May 2020 / Revised: 19 July 2020 / Accepted: 26 July 2020 / Published: 29 July 2020
(This article belongs to the Special Issue Information Technologies and Electronics)
Insider threats that occur within organizations cause more serious damage than external threats. However, there are many factors that are difficult to determine, such as the definition, classification, and severity of security breaches; hence, it is necessary to analyze system logs and user behavior-based scenarios within organizations. The reality is that qualitative judgment criteria are different for everyone to apply, and there is no detailed verification procedure to compare them objectively. In this study, realistic insider threats were examined through the definition, classification, and correlation/association analysis of various human–machine logs of acts associated with security breaches that occur in an organization. In addition, a quantitative process and decision-making tool were developed for insider threats by establishing various internal information leakage scenarios. As a result, insider threats were assessed quantitatively and a decision-making process was completed that enabled case analysis based on several insider threat scenarios. This study will enable precise modeling of insider threats that occur in real organizations and will support an objective process and a decision-making system to establish a range of required information for security protection measures. View Full-Text
Keywords: insider threat; analytic hierarchy process; data leakage; leakage path; risk management; trace insider threat; analytic hierarchy process; data leakage; leakage path; risk management; trace
Show Figures

Figure 1

MDPI and ACS Style

Seo, S.; Kim, D. Study on Inside Threats Based on Analytic Hierarchy Process. Symmetry 2020, 12, 1255. https://doi.org/10.3390/sym12081255

AMA Style

Seo S, Kim D. Study on Inside Threats Based on Analytic Hierarchy Process. Symmetry. 2020; 12(8):1255. https://doi.org/10.3390/sym12081255

Chicago/Turabian Style

Seo, Sang; Kim, Dohoon. 2020. "Study on Inside Threats Based on Analytic Hierarchy Process" Symmetry 12, no. 8: 1255. https://doi.org/10.3390/sym12081255

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop