Claim Missing Document
Check
Articles

Found 2 Documents
Search

Review of insider and insider threat detection in the organizations Arshiya Subhani; Iftikhar Alam Khan; Anmol Zubair
Journal of Advanced Research in Social Sciences and Humanities Vol. 6 No. 4 (2021): JARSSH
Publisher : Journal of Advanced Research in Social Sciences and Humanities

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26500/JARSSH-06-2021-0402

Abstract

Aim: The insider threat is a severe issue in cyber security. Insider threats are largely overlooked by most companies. Workers, system administrators, and outside contractors all have access to confidential company data. It is critical for the organization’s finances and reputation that such sensitive information is kept secret. If sensitive information were to escape the hands of even a tiny percentage of the authorized workforce, it could cause catastrophic financial losses. Protecting a company from the potentially disastrous actions of its own employees presents a formidable challenge, and identifying and eliminating the insider threat is a crucial part of that. This study aims to determine the types of insider threats that can exist within an organization and the best methods for countering them.Methodology: Research on the topic of insider danger is summarized in this paper. Insiders (representing types of insiders, motivation, insider access, methods used by insiders, insider profiling, and levels of insiders); Threat Detection Methods (describing methodology, techniques, datasets used to implement various insider threat detection techniques, and different analyzed user behavior); and Insider Threat Analysis (describing the various analyzed behavior of the user) are the three categories into which the research has been sorted.Findings: Within today’s increasingly digitalized businesses, dishonest employees pose a significant risk. Since the global changes in the business environment, insider threats have become a problem for most companies. There has been an increase in the insider threat since 2019, and one primary reason is the widespread adoption of cloud computing and bring-your-own-device policies for remote work.Implications/Novel Contribution: Future studies are encouraged to improve threat detection methods, evaluate the efficacy of existing methods using a real-world dataset, and adopt a hybrid approach to developing effective models for detecting insider threats.
Importance of Conducting Cyber Security Awareness Sessions among Undergraduate Students Arshiya Subhani; Iftikhar Alam Khan; Usman Ahmad
Journal of Advanced Research in Social Sciences and Humanities Vol. 8 No. 2 (2023): JARSSH
Publisher : Journal of Advanced Research in Social Sciences and Humanities

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26500/JARSSH-08-2023-0202

Abstract

Aim: In this digital era, a person’s day begins with digital devices such as digital watches or smartphones. Cyber security is one of the major concerns in this era. Every device is connected, and hence, it is one of the reasons for most of the data security issues. The aim of this paper is to find out if it is necessary to conduct cybersecurity awareness sessions among students of different fields of study.Methodology: To answer this question, a survey is conducted using the questionnaires and respondents are students from three different fields of study: Creative Computing, Business and Management and Psychology at BSU Academic Center, RAK, UAE. The data collected from 141 respondents was well analyzed.Findings: The findings show a significant difference between the responses of three fields of study. The students of Creative computing are well aware of cyber security terminologies compared to students from other fields of study.Implications/Novel Contribution: The students can be guided with appropriate cyber laws to understand the importance of data security. In the future, cyber security awareness could be created among students by conducting seminars and workshops.