MODELING THE RELATIONSHIP BETWEEN LOYALTY AND INSIDER THREAT

Download
Author
Kassa, Jacques Y.
Date
2021-06Advisor
Zhou, Hong
Second Reader
Roginski, Jonathan, USMA (West Point)
Metadata
Show full item recordAbstract
Malicious insiders pose serious threats to public and private organizations by putting the nation's homeland security at risk and causing millions of dollars in annual losses. Organizations have an urgent need to develop mitigating programs to deal with these threats.
In this research, we explore the possibility of using an individual's loyalty as a mitigation factor. We employ two methods to determine the nature of the relationship between loyalty and insider threats and explore whether the impacts of their interactions can lead to the use of loyalty as a mitigating factor. First, we model the relationships with four linear regression models. We illustrate our approach running simulations with insider threat data from the Department of Defense Personnel and Security Research Center and loyalty data analytically generated using a weight and score method. Second, we exploit Kermack-McKendrick SIR differential equation models to investigate interactions between the two constructs. We consider the employed population as susceptible, insiders as an infected population, and loyalty as the control element. In the first SIR model, we run a simulation without mitigation and let the system self-regulate. In the second model, we run the simulation with loyalty as mitigation measures.
The results show a negative correlation and a dynamic interaction between insider threat and loyalty. Insider threat decreases as a result of the implementation of loyalty as a mitigation measure.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Trusted insiders are committing fraud and embezzlement within organizations: is there a connection to addiction, as the motivating factor for their illegal activities?
Johnson, Paul R. (Monterey, California: Naval Postgraduate School, 2014-06);Extensive studies and research have been conducted on insider threats, the possible causes, predictive models and best practices for prevention, early detection, and mitigation of the threats of insider attacks to a wide ... -
Countermeasures to insider cyber threats for Turkish General Command of Gendarmerie
Çini, Aydın (Monterey, California: Naval Postgraduate School, 2016-09);Insider threats expose every nation, state, and business entity to danger; however, most of these organizations do not realize this, or they choose to ignore it. Since most studies and technical solutions for insider threats ... -
Counter Directed Energy Warfare (CDEW)
Blau, Joseph A.; Johnson, Bonnie W.; Cohn, Keith; Green, John (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N003-ADirected Energy Weapons (DEW) will proliferate and become a threat exploited by adversaries due to high potential mission success and low cost compared to traditional weapons. Counter DEW (CDEW) methods and capabilities ...