Home> Archive> 2019> Volume 9 Number 2 ( May. 2019)
IJSSH 2019 Vol.9(2): 31-35 ISSN: 2010-3646
doi: 10.18178/ijssh.2019.V9.986

Consideration of Insider Based Collusion Attacks on Cyber Systems

James B. McNicholas III and Houssain Kettani

Abstract—Insider threats are a growing concern to both public and private entities. Like other threats within the cyber realm, these threats tend to be dynamic in nature. Organizational structures and varying motivating factors of threat actors can impact the effectiveness of mitigating technologies and strategies. This paper explores the gaps that result when organizations try to segment logical and physical assets, which in turn creates the opportunity for collusion or coordinated attacks. In this paper, various data sources have been examined to identify organizational patterns that can potentially contribute to the successful outcome of these types of attacks. A motivating example is then presented, in junction with the data, to hypothesis what percentage of organizations would be able to identify the actions of insiders working in tandem based on the current state of the industry.

Index Terms—Collusion attack, coordinated attack, cyber threats, insider threat.

James B. McNicholas III and Houssain Kettani are with Dakota State University, United States (e-mail: James.McNicholas@trojans.dsu.edu, houssain.kettani@dsu.edu)

[PDF]

Cite: James B. McNicholas III and Houssain Kettani, "Consideration of Insider Based Collusion Attacks on Cyber Systems," International Journal of Social Science and Humanity vol. 9, no. 2, pp. 31-35, 2019.

PREVIOUS PAPER
NEXT PAPER

Copyright © 2008-2024. International Journal of Social Science and Humanity. All rights reserved.

E-mail: ijssh.editorial.office@gmail.com