Volume 9 - Issue 1
Guest Editorial: Managing Insider Security Threats
- Igor Kotenko
Laboratory of Computer Security Problems, St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS), 39, 14 Liniya, St. Petersburg, 199178, Russia, St. Petersburg National Research University of Information Technologies, Mechanics and Optics, 49, Kronverkskiy prospekt, St. Petersburg, Russia
ivkote@comsec.spb.ru
Keywords: Journal of Wireless Mobile Networks, Ubiquitous Computing, Dependable Applications, Insider Security Threats
Abstract
At present, the most acute problem for any company is the leakage of information. It can occur for
a number of independent reasons, but often the prerequisites lie in the employees themselves, and not
external threats. Insiders pose a great threat to any organization and enterprise. According to opinions
of security experts, about 80% of intrusions and attacks are performed either from within the controlled
zone by the employees of the organization itself, or from outside with their knowledge or with direct
participation. The special issue is aimed to demonstrate some of the latest developments in the area of
managing insider security threats. The issue focuses on problems related to security and cryptography
technologies to prevent, detect and predict insider threats. This special issue includes four papers that outline
different aspects of the Insider Security. These papers are selected from papers originally presented
at the 9th InternationalWorkshop on Managing Insider Security ?Threats (MIST’17) in conjunction with
the ACM Conference on Computer and Communications Security (CCS), Dallas, TX, USA, October 30,
2017.