A Structured Approach to Insider Threat Monitoring for Offensive Security Teams.
Amir Al SadiDavide BerardiFranco CallegatiAndrea MelisMarco PrandiniLuca TolomeiPublished in: CCNC (2023)
Keyphrases
- insider threat
- security architecture
- team formation
- malicious activities
- critical infrastructure
- access control
- security policies
- security model
- monitoring system
- information security
- real time
- security issues
- security mechanisms
- intrusion detection
- intrusion detection system
- network security
- security requirements
- homeland security
- data integrity
- cyber security
- data acquisition
- data streams
- database