Mapping Social Media Insider Threat Attack Vectors

Of the many possible insider threat attack vectors the increasing adoption of social media technologies and applications and the changing generational mindset of young prospective employees poses a particular challenge for maintaining security. This paper discusses an approach using network science...

Full description

Bibliographic Details
Main Author: Armstrong, Colin
Other Authors: Ralph Sprague, Jr
Format: Conference Paper
Published: IEEE Computer Society 2013
Online Access:http://hdl.handle.net/20.500.11937/14264
Description
Summary:Of the many possible insider threat attack vectors the increasing adoption of social media technologies and applications and the changing generational mindset of young prospective employees poses a particular challenge for maintaining security. This paper discusses an approach using network science techniques to map attack vectors and seeing the security problem as either a puzzle to be resolved or a mystery in need of better understanding.