Journal Screenshot

International Journal of Academic Research in Business and Social Sciences

Open Access Journal

ISSN: 2222-6990

Open access

An insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems. The threat may involve fraud, the theft of confidential or commercially valuable information, the theft of intellectual property, or the sabotage of computer systems. Insider threat ranks among the most pressing cyber security challenges that threaten government and industry information infrastructures indirectly give the negatively impact to industries and national security. The threat that insiders pose faced by corporations and governments today is a real and significant problem and to be of serious concern. Selling and sharing confidential information industrial design, organisational strategic plans, customers, suppliers, experts and other valuable information for monetary benefit, revenge, bribery are just some of the examples of insider threats. many are familiar with the damage of insider threat but some of them are familiar with the terms of drudge, cyber plan of attack, cyber security system and others. Therefore, the purpose of this paper is to review issue related to insider threat, potential people to be insider threats, reasons to be an attacker, and the characteristics of the insider threat, as well as to seek more information on the impact to the organisation’s performance. Therefore, it is hoped that this paper will assist readers, especially the top management of the organizations to understanding more on the issue related to the insider threat.

Amiruddin, A. W. (2016), Cyber Security Malaysia. “Malaysia Has High Vurnerability To Cyber Attacks, Says Cyber Security Expert • UKM News Portal.” UKM News Portal. Retrieved (file:///C:/Users/USER/AppData/Local/Mendeley Ltd/Mendeley Desktop/Downloaded/Unknown - Unknown - Malaysia Has High Vurnerability To Cyber Attacks, Says Cyber Security Expert • UKM News Portal.html).
Apau, M. N., Sedek, M., & Ahmad, R. (2018). Inclination of Insider Threats’ Mitigation and Implementation: Concurrence View from Malaysian Employees. In International Conference on Knowledge Management in Organizations (pp. 340-352). Springer, Cham.
Clark, W. (2016). “Threat from Within: Case Studies of Insiders Who Committed Information Technology Sabotage.” Proceedings - 2016 11th International Conference on Availability, Reliability and Security, ARES 2016 414–22.
Hutchins, J. (2015). “Framework for Identifying Cybersecurity Risks in Manufacturing.” Procedia Manufacturing 1:47–63. Retrieved (http://linkinghub.elsevier.com/retrieve/pii/S2351978915010604).
Legg, P. (2011). “Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection.” 4, (1-18).
Myers, J. & Grimaila, M. (2009). “Towards Insider Threat Detection Using Web Server Logs.” … of the 5th Annual Workshop on Cyber … 1. Retrieved (http://portal.acm.org/citation.cfm?doid=1558607.1558670%5Cnhttp://dl.acm.org/citation.cfm?id=1558670).
Nurse, R. C. (2014). “Understanding Insider Threat: A Framework for Characterising Attacks.” 1–16.
Roy, S. (2010). “Assessing Insider Threats to Information Security Using Technical, Behavioural and Organisational Measures.” Information Security Technical Report.
Sedek, M., Ahmad, R., & Othman, N. F. (2018). Motivational Factors in Privacy Protection Behaviour Model for Social Networking. In MATEC Web of Conferences (Vol. 150, p. 05014). EDP Sciences.
Sedek, M., Mahmud, R., Jalil, H. A., & Daud, S. M. (2014). Factors influencing ubiquitous technology usage among engineering undergraduates: a confirmatory factor analysis. Middle-East Journal of Scientific Research, 19, 18-27.
Tuor, A., Kaplan, S., Hutchinson, B., Nichols, N., & Robinson, S. (2017). Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. arXiv preprint arXiv:1710.00811.
Yadav, H. & Shashant, G. (2014). Cyber Attacks: An Impact on Economy to an Organization . International Journal of Information & Computation Technology 4(9):937–40. Retrieved (http://www.).

In-Text Citation: (Isnin & Sedek, 2018)
To Cite this Article: Isnin, S. N., & Sedek, M. (2018). A Review on Insider Threat Status in Malaysian Organization. International Journal of Academic Research in Business and Social Sciences, 8(10), 1208–1215.