Insider Threats Meet Access Control: Insider Threats Detected Using Intent-Based Access Control (IBAC) cover art

Insider Threats Meet Access Control: Insider Threats Detected Using Intent-Based Access Control (IBAC)

Preview

£0.00 for first 30 days

Try for £0.00
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£7.99/month after 30 days. Renews automatically. See here for eligibility.

Insider Threats Meet Access Control: Insider Threats Detected Using Intent-Based Access Control (IBAC)

By: Abdulaziz M Almehmadi PhD
Narrated by: Jonathan Frazier
Try for £0.00

£7.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £11.99

Buy Now for £11.99

Confirm Purchase
Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.
Cancel

About this listen

Existing access control mechanisms are based on the concepts of identity enrollment and recognition and assume that recognized identity is synonymous with ethical actions. However, statistics over the years show that the most severe security breaches have been the results of trusted, authorized, and identified users who turned into malicious insiders. Therefore, demand exists for designing prevention mechanisms. A non-identity-based authentication measure that is based on the intent of the access request might serve that demand.

In this book, we test the possibility of detecting intention of access using involuntary electroencephalogram (EEG) reactions to visual stimuli. This method takes advantage of the robustness of the Concealed Information Test to detect intentions. Next, we test the possibility of detecting motivation of access, as motivation level corresponds directly to the likelihood of intent execution level. Subsequently, we propose and design Intent-based Access Control (IBAC), a non-identity-based access control system that assesses the risk associated with the detected intentions and motivation levels.

We then study the potential of IBAC in denying access to authorized individuals who have malicious plans to commit maleficent acts. Based on the access risk and the accepted threshold established by the asset owners, the system decides whether to grant or deny access requests.We assessed the intent detection component of the IBAC system using experiments on 30 participants and achieved accuracy of 100 percent using Nearest Neighbor and SVM classifiers. Further, we assessed the motivation detection component of the IBAC system. Results show different levels of motivation between hesitation-based vs. motivation-based intentions. Finally, the potential of IBAC in preventing insider threats by calculating the risk of access using intentions and motivation levels as per the experiments shows access risk that is different between unmotivated and motivated groups.

©2016, 2018 Abdulaziz Almehmadi (P)2019 Abdulaziz Almehmadi
Computer Science Motivation Computer Security
activate_Holiday_promo_in_buybox_DT_T2

Listeners also enjoyed...

Cyber Intelligence Driven Risk cover art
Zero Trust and Third-Party Risk cover art
Trustworthy AI cover art
A Vulnerable System cover art
Cybersecurity cover art
Navigating New Cyber Risks cover art
The Psychology of Information Security cover art
Simple CISSP Exam Questions cover art
Essential CISA Exam Guide: Updated for the 26th Edition cover art
Cybersecurity for Beginners cover art
Certified Information Security Manager CISM Study Guide cover art
ISO27001/ISO27002: A Pocket Guide cover art
CISSP Exam Audio Study Guide! Practice Questions Edition! cover art
Eleventh Hour CISSP® cover art
Prepare for the ISACA Certified Information Security Manager Exam cover art
Essential CISM: Updated for the 16th Edition CISM Review Manual cover art

What listeners say about Insider Threats Meet Access Control: Insider Threats Detected Using Intent-Based Access Control (IBAC)

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.