Figure 4 - uploaded by Leung Chim
Content may be subject to copyright.
Different attack pathways for three types of insiders. The security breach is represented by the star element in each pathway.

Different attack pathways for three types of insiders. The security breach is represented by the star element in each pathway.

Contexts in source publication

Context 1
... therefore have three different insider scenarios playing out against three different security systems (the current default, option A and option B) which gives us nine combinations to evaluate. We represent the attack sequences or pathways for each insider type in Fig. 4. Each pathway begs interventions to break its progression, and the nature of those interventions is different for each pathway. For the disloyal insider and the mole, the pathways also include some return elements which provide additional opportunities to catch these perpetrators, possibly not during the first successful attack but ...
Context 2
... therefore have three different insider scenarios playing out against three different security systems (the current default, option A and option B) which gives us nine combinations to evaluate. We represent the attack sequences or pathways for each insider type in Fig. 4. Each pathway begs interventions to break its progression, and the nature of those interventions is different for each pathway. For the disloyal insider and the mole, the pathways also include some return elements which provide additional opportunities to catch these perpetrators, possibly not during the first successful attack but ...

Citations

... Cybersecurity frameworks thus provide comprehensive guidelines that span several security domains and generally do not outline detailed steps required to be carried out for the implementation of security controls [8]. These provide users with some degree of freedom to customise their security arrangements to meet the organisation's cybersecurity needs [9]. In other words, users describe the security scope, risk evaluation, and implementation processes through a cybersecurity framework's defined general structure [10]. ...