Publication:
INSIDER THREATS: PROFILING POTENTIAL MALICIOUS ATTACKS, SEVERITY AND IMPACT

dc.contributor.authorIbrahim Z.-A.en_US
dc.contributor.authorRahim F.A.en_US
dc.contributor.authorAlauddin A.A.en_US
dc.contributor.authorJamil N.en_US
dc.contributor.authorAbdullah H.I.M.en_US
dc.contributor.authorid57203863738en_US
dc.contributor.authorid57350579500en_US
dc.contributor.authorid57808678500en_US
dc.contributor.authorid36682671900en_US
dc.contributor.authorid57607963100en_US
dc.date.accessioned2023-05-29T09:36:58Z
dc.date.available2023-05-29T09:36:58Z
dc.date.issued2022
dc.description.abstractThe insider threat that organizations and cooperation face today is a real and serious issue that has become increasingly difficult to address as time has passed. More complex approaches must be researched and developed for reliable recognition, detection, and response to insider threats. One way to achieve this is by identifying and classifying diverse viewpoints of insider threats. Various studies focused on comprehending and mitigating insider threats by developing different taxonomies and terminologies relating to insiders, insider threats, and insider attacks. However, few are concerned about the severity and impact of insider threats to an organization. Therefore, this paper proposes a taxonomy for profiling potential malicious attacks, highlighting severity to determine the impact of insider threats and the prioritization of vulnerability remediation activities. � 2022 Little Lion Scientificen_US
dc.description.natureFinalen_US
dc.identifier.epage4838
dc.identifier.issue13
dc.identifier.scopus2-s2.0-85134406736
dc.identifier.spage4827
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85134406736&partnerID=40&md5=a30f27a4eddde7efe82fce7b09a1c92f
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/26823
dc.identifier.volume100
dc.publisherLittle Lion Scientificen_US
dc.sourceScopus
dc.sourcetitleJournal of Theoretical and Applied Information Technology
dc.titleINSIDER THREATS: PROFILING POTENTIAL MALICIOUS ATTACKS, SEVERITY AND IMPACTen_US
dc.typeArticleen_US
dspace.entity.typePublication
Files
Collections