• Insider Threats Meet Access Control: Insider Threats Detected Using Intent-Based Access Control (IBAC)

  • De: Abdulaziz M Almehmadi PhD
  • Narrado por: Jonathan Frazier
  • Duración: 4 h y 56 m
  • 5.0 out of 5 stars (3 calificaciones)

Prime logotipo Exclusivo para miembros Prime: ¿Nuevo en Audible? Obtén 2 audiolibros gratis con tu prueba.
Elige 1 audiolibro al mes de nuestra inigualable colección.
Escucha todo lo que quieras de entre miles de audiolibros, Originals y podcasts incluidos.
Accede a ofertas y descuentos exclusivos.
Premium Plus se renueva automáticamente por $14.95 al mes después de 30 días. Cancela en cualquier momento.
Insider Threats Meet Access Control: Insider Threats Detected Using Intent-Based Access Control (IBAC)  Por  arte de portada

Insider Threats Meet Access Control: Insider Threats Detected Using Intent-Based Access Control (IBAC)

De: Abdulaziz M Almehmadi PhD
Narrado por: Jonathan Frazier
Prueba por $0.00

US$14.95 al mes después de 30 días. Cancela en cualquier momento.

Compra ahora por US$14.95

Compra ahora por US$14.95

la tarjeta con terminación
Al confirmar tu compra, aceptas las Condiciones de Uso de Audible y el Aviso de Privacidad de Amazon. Impuestos a cobrar según aplique.

Resumen del Editor

Existing access control mechanisms are based on the concepts of identity enrollment and recognition and assume that recognized identity is synonymous with ethical actions. However, statistics over the years show that the most severe security breaches have been the results of trusted, authorized, and identified users who turned into malicious insiders. Therefore, demand exists for designing prevention mechanisms. A non-identity-based authentication measure that is based on the intent of the access request might serve that demand.

In this book, we test the possibility of detecting intention of access using involuntary electroencephalogram (EEG) reactions to visual stimuli. This method takes advantage of the robustness of the Concealed Information Test to detect intentions. Next, we test the possibility of detecting motivation of access, as motivation level corresponds directly to the likelihood of intent execution level. Subsequently, we propose and design Intent-based Access Control (IBAC), a non-identity-based access control system that assesses the risk associated with the detected intentions and motivation levels.

We then study the potential of IBAC in denying access to authorized individuals who have malicious plans to commit maleficent acts. Based on the access risk and the accepted threshold established by the asset owners, the system decides whether to grant or deny access requests.We assessed the intent detection component of the IBAC system using experiments on 30 participants and achieved accuracy of 100 percent using Nearest Neighbor and SVM classifiers. Further, we assessed the motivation detection component of the IBAC system. Results show different levels of motivation between hesitation-based vs. motivation-based intentions. Finally, the potential of IBAC in preventing insider threats by calculating the risk of access using intentions and motivation levels as per the experiments shows access risk that is different between unmotivated and motivated groups.

©2016, 2018 Abdulaziz Almehmadi (P)2019 Abdulaziz Almehmadi

Lo que los oyentes dicen sobre Insider Threats Meet Access Control: Insider Threats Detected Using Intent-Based Access Control (IBAC)

Calificaciones medias de los clientes
Total
  • 5 out of 5 stars
  • 5 estrellas
    3
  • 4 estrellas
    0
  • 3 estrellas
    0
  • 2 estrellas
    0
  • 1 estrella
    0
Ejecución
  • 5 out of 5 stars
  • 5 estrellas
    3
  • 4 estrellas
    0
  • 3 estrellas
    0
  • 2 estrellas
    0
  • 1 estrella
    0
Historia
  • 5 out of 5 stars
  • 5 estrellas
    3
  • 4 estrellas
    0
  • 3 estrellas
    0
  • 2 estrellas
    0
  • 1 estrella
    0

Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.

Ordenar por:
Filtrar por:
  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars
El oyente recibió este título gratis

worth the read

short, simple and concise. the book delivers the message clearly. would definitely recommend it to others as well.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

esto le resultó útil a 1 persona

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars
El oyente recibió este título gratis

Amazing book

It was great to learn about insider threats and access control and how the intent based access control can prevent insider threats. Highly recommended.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña