Understanding the insider threat : proceedings of a March 2004 workshop / Richard C. Brackney, Robert H. Anderson. - xxii, 113 pages : illustrations ; 28 cm - Conference proceedings / RAND ; 196 . - Conference proceedings (Rand Corporation) ; 196. .

"National Security Research Division."

Includes bibliographical references (p. 113).

Introduction -- IC System Models -- Vulnerabilities and Exploits -- Attacker Models -- Event Characterization -- Workshop Invitation -- Workshop Agenda -- Links to Read-Ahead Materials -- Workshop Participants -- The Robert Hanssen Case: An Example of the Insider Threat to Sensitive U.S. Information Systems Overview of the Results of a Recent ARDA Workshop on Cyber Indications and Warning Intelink Factoids Glass Box Analysis Project Interacting with Information: Novel Intelligence from Massive Data. Appendix: Presentation: Presentation: Presentation: Presentation: Presentation:

Perhaps the greatest threat that the intelligence community (IC) must address in the area of information assurance is the "insider threat"-malevolent (or possibly inadvertent) actions by an already trusted person with access to sensitive information and information systems. This document reports the results of a workshop that brought together IC members with specific knowledge of IC document management systems and IC business practices; persons with knowledge of insider attackers, both within and outside the IC; and researchers involved in developing technology to counter insider threats. Plenary and breakout sessions discussed various aspects of the problem, including intelligence community system models, vulnerabilities and exploits, attacker models, and event characterization. Participants listed the following challenges: defining an effective way of monitoring what people do with their cyber access; developing policies and procedures to create as bright a line as possible between allowed and disallowed behaviors; considering sociological and psychological factors and creating better cooperation between information systems personnel and human resources personnel; and combining events from one or more sensors (possibly of various types or different levels of abstraction) to facilitate building systems that test hypotheses about malicious insider activity. Workshop members also considered what databases would aid in this research if they were available.



0833036807

RAND/CF-196-ARDA

$35.00 paperback


United States. Department of Defense --Computer networks--Security measures--Congresses.


Command and control systems--Security measures--United States--Congresses.
Computer networks--Security measures--United States--Congresses.
Information services--Security measures--United States--Congresses.
Information warfare--United States--Congresses.
National security--United States--Congresses.


United States--Defenses--Congresses.

UB247 / .U53 2004