Please use this identifier to cite or link to this item: https://www.um.edu.mt/library/oar/handle/123456789/92805
Title: The insider threat : data breach within an organisation
Authors: Gatt, Rebecca Martina (2014)
Keywords: Data protection
Electronic data processing departments -- Security measures
Data privacy
Fuzzy logic
Issue Date: 2014
Citation: Gatt, R. M. (2014). The insider threat : data breach within an organisation (Bachelor's dissertation).
Abstract: The Insider Threat issue has been identified as a serious security problem, so much so that considerable research, primarily by the CERT Insider Threat Centre, has been carried out. Threats originating from within an organisation's security perimeter, are a substantial problem, mainly because distinguishing between a malicious activity from a benign activity is rather challenging. Whilst there is no perfect solution capable in detecting different types of attacks posed by an insider, this work explores the research carried out on this subject and analyses the various approaches taken by different authors in order to mitigate this problem. This study focuses on identifying internal activities that might indicate violation to the integrity and confidentiality of a company's information security. Research shows that through monitoring and logging of users' activities, early detection of possible threats is probable. A system has been designed to use the historical logs to actively assess potential threats caused by insider/s, by applying the concept of Fuzzy Logic to certain aspects of the system. A set of Fuzzy Rules were used to differentiate between normal and abnormal behaviour. Research shows that this is an effective method to drastically reduce the number of false positives generated by the classic Intrusion Detection Systems. Furthermore, Damerau-Levenshtein Distance algorithm was implemented in order to further improve the ability to detect the leakage of confidential information via email. Positive results were achieved on all tests carried out and anomalies detected were successfully escalated to the system administrator in a timely manner. A survey was conducted to further analyse and evaluate the Insider Threat issue amongst local organisations. Emerging results, showed an increase in the companies' awareness and their intent to re-evaluate their business strategy in order to adopt more proactive measures to counteract this problem.
Description: B.Sc. IT (Hons)(Melit.)
URI: https://www.um.edu.mt/library/oar/handle/123456789/92805
Appears in Collections:Dissertations - FacICT - 2014
Dissertations - FacICTCIS - 2010-2015

Files in This Item:
File Description SizeFormat 
B.SC.(HONS)ICT_Gatt_Rebecca Martina_2014.PDF
  Restricted Access
8.81 MBAdobe PDFView/Open Request a copy
Gatt_Rebecca_Martina_acc.material.pdf
  Restricted Access
215.42 kBAdobe PDFView/Open Request a copy


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.