Volume 5 - Issue 2
Guest Editorial: Emerging Trends in Research for Insider Threat Detection
- William R. Claycomb
Software Engineering Institute, Carnegie Mellon University, USA
claycomb@cert.org
- Philip A. Legg
Department of Computer Science, University of Oxford, UK
phil.legg@cs.ox.ac.uk
- Dieter Gollmann
Security in Distributed Applications, Technische Universitat Hamburg-Harburg, Germany
diego@tuhh.de
Keywords: Journal of Wireless Mobile Networks, Ubiquitous Computing, Dependable Applications, insider threat
Abstract
The insider threat is one of mankind’s most enduring security challenges. For as long as people have
placed trust in one other, they have faced the risk of that trust being violated. Historically, consequences
of insider attacks included compromised organizational security, financial loss, and risks to human health
and safety. Prior to the information age, attacks mainly targeted tangible assets, such as people or money;
now insider attacks target additional assets related to information technology (IT), such as data and systems.
For instance, malicious insiders may steal intellectual property, sabotage corporate IT systems,
or use IT systems to commit financial fraud. Insider attacks have plagued humanity for millennia, and
researchers and security professionals continue to struggle to fully understand the breadth of the problem
and to propose solutions proven to have measurable effects on reducing the occurrence and impact
of attacks. Even defining “insider threat” can be problematic, depending on the problem space. One
definition used in the IT security arena is as follows: