vii TABLE OF CONTENTS CHAPTER 1 2 TITLE PAGE DECLARATION ii DEDICATION iii ACKNOWLEDGMENT iv ABSTRACT v ABSTRAK vi TABLE OF CONTENTS vii LIST OF TABLES xii LIST OF FIGURES xiv LIST OF APPENDICES xvi INTRODUCTION 1 1.1 Introduction 1 1.2 Problem Background 1 1.3 Problem Statement 3 1.4 Aim of this Study 4 1.5 Research objectives 4 1.6 Project Scope 4 1.7 Significance of the Research 5 1.8 Organization of Report 6 LITERATURE REVIEW 7 2.1 Introduction 7 2.2 Insider threats 8 2.3 The impact of the insider threat 9 2.4 The key characteristics of insider threats 9 viii 2.5 2.6 2.4.1 Trust 10 2.4.2 Access 10 2.4.3 Knowledge and skills 10 2.4.4 Security perimeter 11 Categorizing insiders 11 2.5.1 Pure insider 12 2.5.2 Insider associate 12 2.5.3 Insider affiliate 13 2.5.4 Outside affiliate 13 Insider threat and threat agents 14 2.6.1 Insider threat capability 15 2.6.2 Insider threat motivation 15 2.6.3 Insider threat opportunity 16 2.7 End user security behavior 17 2.8 Insider threat profiles 19 2.9 Classification of countermeasure of Insider Threats 22 2.9.1 22 2.10 Technical-, Formal- and Informal controls Factors affecting human behavior in the of shifting technical, social, business and cultural factors 2.10.1 2.10.2 2.10.3 26 Technical and social factors affecting the insider threat 26 2.10.1.1 Technology is impacting on social interactions 26 2.10.1.2 Security is not keeping up with technological and social changes in the workplace 27 Business and economic factors affecting the insider threat 28 2.10.2.1 Outsourcing can increase insider risks 28 2.10.2.2 The global recession is affecting insider Behavior 28 Cultural factors affecting the insider Threat 29 ix 2.11 29 2.10.3.2 Regional culture 30 The importance of non-technical mitigations for the insider threat 2.11.1 2.12 2.10.3.1 Organizational culture 30 Enforce baseline security policies and Procedures 30 2.11.2 Extend traditional policy and guidance 31 2.11.3 Conduct ongoing personnel checks 31 Existing Frameworks for human behavior to mitigate the insider threats 31 2.12.1 A framework for insider threats 32 2.12.1.1 The Organization 32 2.12.1.2 The System 33 2.12.1.3 The Individual 34 2.12.1.4 The environment 34 End user security behavior 35 2.12.2.1 The body of knowledge 36 2.12.2.2 The behavior demonstrated by senior management 36 2.12.2 2.12.2.3 The user’s security common sense and decision making skills 2.12.2.4 The user’s personal values and standards of conduct 37 The user’s sense of obligation 37 The difficulty in complying 38 2.12.2.5 2.12.2.6 2.12.3 2.12.4 36 Insider Prediction Model 38 2.12.3.1 User Taxonomy 39 2.12.3.2 Psychological Profiling 40 2.12.3.3 Real Time Usage Profiling 40 2.12.3.4 Decision Manager 40 Framework for relations between threat, countermeasure, human factor and behavior 41 x 2.12.4.1 Information security Internal Threat 42 Countermeasures to mitigate insider threats 42 2.12.4.3 Human factors 43 2.12.4.4 User Behavior 44 2.12.4.2 2.13 3 Summary 53 METHODOLOGY 55 3.1 Introduction 55 3.2 Research Methodology 55 3.3 Operational Framework 56 3.3.1 Phase 1 59 3.3.2 Phase 2 60 3.3.2.1 Compose the questionnaire 61 3.3.2.2 Distributing the questionnaire 61 Phase 3 62 3.3.3.1 Analyze the questionnaire 62 3.3.3 3.4 4 Summary 63 FRAMEWORK IMPLEMENTATION 64 4.1 Introduction 64 4.2 Conceptual Framework for Human Behavior to Mitigate of Insider Threat 64 4.2.1 User Motivation 66 4.2.2 Organizational security culture 66 4.2.3 User Training 67 4.2.4 Security Knowledge 68 4.2.5 Security policy 68 4.2.6 Decision making skills 68 4.2.7 User Personal Value 69 4.3 Summary 69 xi 5 ANALYSIS AND RESULT 70 5.1 Introduction 70 5.2 Validation the Components Framework of Human Behavior to Mitigate the Insider Threat 5.2.1 Demographics 70 71 5.2.2 User Motivation 72 5.2.2.1 5.2.3 5.2.4 5.2.5 73 5.2.2.3 Facilities 74 Security Organizational Culture 75 5.2.3.1 Attitude 76 5.2.3.2 Trust 77 User Training 5.2.4.1 Security Awareness 78 5.2.4.2 Skills 79 Security knowledge Security policy awareness, standards and procedures 80 80 5.2.6 Security policy 81 5.2.7 Decision making skills 83 5.2.7.1 Capability 83 5.2.7.2 Opportunity 84 5.2.8 5.4 72 5.2.2.2 Rewards 5.2.5.1 5.3 Increasing Employee’s Salary User personal values 85 Recommendations from the Expert 87 5.3.1 User motivation 87 5.3.2 Security Organizational Culture 87 5.3.3 User Training 88 5.3.4 Security knowledge 88 5.3.5 Security policy 89 5.3.6 Decision Making Skills 89 5.3.7 User Personal Values 90 Components of human behavior to mitigate the insider Threat 90 xii 5.5 5.6 6 Framework of human behavior to mitigate the insider threat 94 Summary 96 DISCUSSION AND CONCLUSSION 6.1 Introduction 97 6.2 Project Achievement 97 6.3 Project Constraints 98 6.4 Future Works 99 6.5 Summary 99 REFERENCES 100 APPENDIX A 104 APPENDIX B 111 APPENDIX C 118 xiii LIST OF TABLES TABLE NO. TITLE PAGE 2.1 The Insider Threats Profiles 21 2.2 The Countermeasure on Insider Threat 25 2.3 Conceptual frameworks for human behavior to mitigate the Insider Threats 45 2.4 Features of existing Framework 47 2.5 The strength and weakness of existing Human Behavior framework to mitigate Insider Threats 49 Selected Components of the Insider Threat Framework 51 3.1 Details of Research Methodology 57 5.1 Demographic Characters of Questionnaire Respondents 72 5.2 Violate the Security Policy 83 5.3 User Personal Values 86 5.4 Contribution of selected components of Human Behavior to mitigate the Insider Threat 91 2.6 xiv LIST OF FIGURES FIGURE NO. TITLE PAGE 2.1 Categories of Insiders 13 2.2 Factors contributing to the creation of an Insider Threat 14 2.3 The Components of Capability 15 2.4 The Components of Motivation 16 2.5 The Components of Opportunity 17 2.6 ABC Model 18 2.8 Frameworks for Insider Threats 32 2.9 Factors that influence User Security Behavior 35 2.10 Insider Threat Prediction Model 39 2.11 Relation between Threats, Countermeasure, Human Factors, Behaviors 41 3.1 Operational Framework of the Research 57 4.1 Conceptual Framework Human Behavior to Mitigate of Insider Threat 65 Influencing information security behavior and cultivating an information security culture. 67 5.1 Motivation by increasing employee’s salary 73 5.2 Rewards for employees 74 5.3 Facilities for Employees 75 5.4 Attitude of employees in an organization 76 5.5 Trust in an organizational culture 77 5.6 Security awareness 79 5.7 Employee skills 80 5.8 Security Knowledge 81 5.9 Security policies in an Organization 82 4.2 xv 5.10 Capability 84 5.11 Opportunity 85 5.12 Proposed Framework of Human Behavior to mitigate the Insider Threat 95 xvi LIST OF APPENDICES APPENDIX TITLE PAGE A Questionnaire Form 104 B Answered Questionnaire Form 111 C Interview Form 118