Zobrazeno 1 - 10
of 68
pro vyhledávání: '"Frank L. Greitzer"'
Publikováno v:
ACM Transactions on Social Computing. 4:1-48
This article reports on a simulated phishing experiment targeting 6,938 faculty and staff at George Mason University. The three-week phishing campaign employed three types of phishing exploits and examined demographic, linked workstation/network moni
Autor:
Frank L. Greitzer, Justin Purl
Publikováno v:
SN Computer Science. 3
Autor:
Ryan E Hohimer, Frank L Greitzer
Publikováno v:
Journal of Strategic Security, Vol 4, Iss 2, Pp 25-48 (2011)
The insider threat ranks among the most pressing cyber-security challenges that threaten government and industry information infrastructures. To date, no systematic methods have been developed that provide a complete and effective approach to prevent
Externí odkaz:
https://doaj.org/article/03375319cc9c4287ad16c1f744e9fa4b
Publikováno v:
IEEE Engineering Management Review. 47:75-83
Insider threats refer to actions by trusted individuals that directly or indirectly bring harm to the organization or expose the organization to external risks. Insider threat detection research and mitigation approaches have over-relied on technical
Publikováno v:
Procedia Computer Science. 153:361-369
We describe the development and envisioned use case applications of a comprehensive insider threat ontology—“Sociotechnical and Organizational Factors for Insider Threat” (SOFIT)—that comprises more than 300 indicators of technical, behaviora
Publikováno v:
HICSS
Autor:
Frank L. Greitzer
Publikováno v:
Proceedings of the Northwest Cybersecurity Symposium.
Insider threats refer to threats posed by individuals who intentionally or unintentionally destroy, exfiltrate, or leak sensitive information, or expose their organization to outside attacks. Surveys of organizations in government and industry consis
Publikováno v:
HICSS
Publikováno v:
IEEE Symposium on Security and Privacy Workshops
Human behavioral factors have been insufficiently represented in structured models (e.g., ontology frameworks) of insider threat risk. This paper describes the design and development of a structured model that emphasizes individual and organizational
Autor:
Jennifer Cowley, Frank L. Greitzer
Publikováno v:
Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 59:1187-1191
Expertise shortages in cybersecurity operations in part may due to organizational factors that encumber expertise development and maintenance. Using an online survey approach with 157 cybersecurity professionals, we began a validation effort of 23 or