首页> 外文会议>Industrial and Systems Engineering Conference >Profiling in Air Force to Reduce Insider Threat
【24h】

Profiling in Air Force to Reduce Insider Threat

机译:剖析空军以减少内幕威胁

获取原文

摘要

To software, humans can be classified in two ways: insider or outsider and ill-intended or well-intended. Dealing with outsider humans is relatively straightforward as they just need to be blocked from acquiring access to the system and its data. Dealing with insider humans is much trickier as they need access to perform their jobs effectively. An essential tradeoff exists between security and efficiency depending upon the level of access. Further complications arise as insiders can switch from being well-intentioned to ill-intentioned and vice-versa. Many conventions have been proposed to minimize the access individuals need and are granted to lower the degree of danger insiders pose, but the underlying problem remains the same: systems have to inherently trust its insiders. As this scheme has yet to be resolved, this paper will seek an intermediate solution that aims to discover well-intentioned insiders with the highest likelihood of becoming ill-willed before they act out on their will. The main method that will be explored will combine user's network activity along with their demographics and background information to create a threat behavioral profile for each insider. This method will be applied to a base case of the US Air Force to examine its proficiency.
机译:对软件来说,人类可以通过两种方式进行分类:内幕或局外人和危险或缺乏意图。处理Outsider人类相对简单,因为他们只需要被阻止获取对系统及其数据的访问。处理内幕人类的人很棘手,因为他们需要有效地进行工作。根据访问水平,安全性和效率之间存在必要的权衡。进一步的并发症由于内部人员可以从善意的意向切换到弊端,反之亦然。已经提出了许多公约来最大限度地减少获得个人所需的个人,并获得危险内部人士姿势的程度,但潜在的问题仍然是相同的:系统必须自然地信任其内部人士。由于该计划尚未得到解决,本文将寻求一个中间解决方案,旨在发现善意的内部人士,在他们对其意志行为之前变得不佳的可能性。将探索的主要方法将使用户的网络活动与他们的人口统计数据和背景信息相结合,为每个内部人创建威胁行为配置文件。该方法将应用于美国空军的基本情况,以检查其熟练程度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号