Publication: INSIDER THREATS: PROFILING POTENTIAL MALICIOUS ATTACKS, SEVERITY AND IMPACT
dc.contributor.author | Ibrahim Z.-A. | en_US |
dc.contributor.author | Rahim F.A. | en_US |
dc.contributor.author | Alauddin A.A. | en_US |
dc.contributor.author | Jamil N. | en_US |
dc.contributor.author | Abdullah H.I.M. | en_US |
dc.contributor.authorid | 57203863738 | en_US |
dc.contributor.authorid | 57350579500 | en_US |
dc.contributor.authorid | 57808678500 | en_US |
dc.contributor.authorid | 36682671900 | en_US |
dc.contributor.authorid | 57607963100 | en_US |
dc.date.accessioned | 2023-05-29T09:36:58Z | |
dc.date.available | 2023-05-29T09:36:58Z | |
dc.date.issued | 2022 | |
dc.description.abstract | The insider threat that organizations and cooperation face today is a real and serious issue that has become increasingly difficult to address as time has passed. More complex approaches must be researched and developed for reliable recognition, detection, and response to insider threats. One way to achieve this is by identifying and classifying diverse viewpoints of insider threats. Various studies focused on comprehending and mitigating insider threats by developing different taxonomies and terminologies relating to insiders, insider threats, and insider attacks. However, few are concerned about the severity and impact of insider threats to an organization. Therefore, this paper proposes a taxonomy for profiling potential malicious attacks, highlighting severity to determine the impact of insider threats and the prioritization of vulnerability remediation activities. � 2022 Little Lion Scientific | en_US |
dc.description.nature | Final | en_US |
dc.identifier.epage | 4838 | |
dc.identifier.issue | 13 | |
dc.identifier.scopus | 2-s2.0-85134406736 | |
dc.identifier.spage | 4827 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85134406736&partnerID=40&md5=a30f27a4eddde7efe82fce7b09a1c92f | |
dc.identifier.uri | https://irepository.uniten.edu.my/handle/123456789/26823 | |
dc.identifier.volume | 100 | |
dc.publisher | Little Lion Scientific | en_US |
dc.source | Scopus | |
dc.sourcetitle | Journal of Theoretical and Applied Information Technology | |
dc.title | INSIDER THREATS: PROFILING POTENTIAL MALICIOUS ATTACKS, SEVERITY AND IMPACT | en_US |
dc.type | Article | en_US |
dspace.entity.type | Publication |