information security management. The attributes
which are considered for this type of model are:
logical or physical location, authorization,
expected behaviour, motivation and trust.
According to this theory insider abuses can be
controlled by four steps, which are: deterrence,
prevention, detection and remediation (Coles-
Kemp and Theoharidou, 2010). Other models deal
with Intellectual properties (Moore, et. al., 2009),
(Moore, et. al., 2011). In this approach, there exist
two types of scenarios. One is termed Entitled
Independence scenario. Here, it is assumed that an
insider acts alone to steal information. The other
scenario is known as Ambitious Leader scenario,
in which a leader facilitates and influences insiders
for stealing critical information. Some access
control models based on graphical approach
(Althebyan and Panda, 2008), (Eberle and Holder,
2009), or policy based representation (Bishop, et.
al, 2010), (Bishop and Gates, 2008), are also used
for insider threat modelling. These models help to
identify the users who have access to high value
resources and may cause damages to
organizational assets. According to this approach,
every insider of an organization should have a
level of access which may be privileged, or
ordinary, or full (Bishop, et. al, 2010). In case of
graph-based approaches, a graphical representation
of access control threat model is provided. On the
other hand, Carlson’s Unification Policy Hierarchy
presents a hierarchical approach to insider threat
modelling (Bishop, et. al, 2010), (Bishop, and
Gates, 2008).
As is obvious from the above discussion, the
existing models of insider threats are usually based
on social aspects like human behavior, mental state
or access rights. In many of the cases, these
parameters are fuzzy or statistical in nature. Use of
these parameters is sometimes controversial also.
Most of the published models concentrate only on
the human agents. The behavioral and psychology-
cal traits are basically extraneous to the enterprise
information system. Moreover, these methods do
not consider the technological details of enterprise
information architectures. Also, these models do
not capture active agents like malicious software
and network components with embedded malicious
software as insider threats.
3 A FRAMEWORK FOR
ENTERPRISE MODELLING
Enterprise is the common illustration of
organization. In general an “enterprise” is defined
as an organization (Industry / Govt. / Academic)
created for business ventures. In today’s
enterprises, because of web-connection and
outsourcing of data and services, it is very difficult
to delineate the boundary. Following are the
definitions of Outsider and Insider of enterprises
proposed in this Position paper.
Outsider and Insider are spatio-temporal
concepts. We define an entity to be an outsider to
an enterprise during a particular time interval, if
the entity does not have any access to the
enterprise assets. An Insider, on the other hand,
has access to the enterprise assets. An Insider
Threat is an insider entity of an enterprise that has
the capability and intent to cause harm or danger to
the assets. At a particular time interval an insider
threat may become an Insider Attacker if it
attempts to perpetrate an attack to an enterprise
asset and cause some harmful effects by breaching
any of the security properties of the enterprise.
3.1 Enterprise Model
An enterprise is characterised by a set of primary
assets: Processes (both Business Processes and
Management Processes), Information and some
Intangible assets (e.g. reputation, goodwill,
recommendation, and trust). Since the intangible
assets do not play any direct role in enterprise
security, we do not include them in our model of
enterprise. Thus, an enterprise can be defined as
follows:
En = {{P}, {Info}} (1)
Where {P} is the set of processes and {Info} is
the set of information assets of enterprise En.
Executions of processes are enabled by
supporting assets: hardware, software, network,
site, personnel, and organizational structure.
Information assets are usually utilized / created
by Business Processes and are managed by
Management Processes. Information assets are
stored and manifested by data, which are stored in
structured form or unstructured documents. A
major goal of security is to maintain the
confidentiality, integrity and availability of the
structured and unstructured data of an enterprise.
An enterprise process is a workflow of a
sequence of activities to achieve a certain goal. An
activity includes task structures, which may be
sequential, conditional, iterative or parallel. Each
structure has single entry and single exit point. A
task can be represented by a function having some
input data and output data and causing a change of
ModellingofEnterpriseInsiderThreats
133