BOOK-CHAPTER

Insider Threat Prevention, Detection and Mitigation

Abstract

The purpose of this chapter is to introduce the insider threat and discuss methods for preventing, detecting, and responding to the threat. Trusted insiders present one of the most significant risks to an organization. They possess elevated privileges when compared to external users, have knowledge about technical and non-technical control measures, and potentially can bypass security measures designed to prevent, detect, or react to unauthorized access. In this chapter, we define the insider threat and summarize various case studies of insider attacks in order to highlight the severity of the problem. We then discuss best practices for preventing, detecting, and mitigating insider attacks, to include application of risk management principles specific to the insider threat. Finally, we provide a survey of ongoing research into detecting irregular activities that are potentially harmful to an organization.

Keywords:
Insider threat Insider Computer security Business Risk analysis (engineering) Internet privacy Security management Control (management) Computer science Political science Artificial intelligence

Metrics

3
Cited By
0.91
FWCI (Field Weighted Citation Impact)
12
Refs
0.77
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Information and Cyber Security
Physical Sciences →  Computer Science →  Information Systems
Cybercrime and Law Enforcement Studies
Physical Sciences →  Computer Science →  Information Systems
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

BOOK-CHAPTER

Insider Threat Prevention, Detection, and Mitigation

Michael G. Gelles

Oxford University Press eBooks Year: 2021 Pages: 669-679
JOURNAL ARTICLE

Insider Threat Detection and Mitigation

Anvesh GunugantiUSA

Journal:   Journal of Mathematical & Computer Applications Year: 2024 Pages: 1-6
JOURNAL ARTICLE

Insider Threat Detection and Prevention Protocol: ITDP

Amnat SawatnateeSomchai Prakancharoen

Journal:   International Journal of Online and Biomedical Engineering (iJOE) Year: 2021 Vol: 17 (02)Pages: 69-89
© 2026 ScienceGate Book Chapters — All rights reserved.