Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/18707
Full metadata record
DC FieldValueLanguage
dc.contributor.authorIsmaila, Idris-
dc.contributor.authorAdeleke, Nafisa Damilola-
dc.date.accessioned2023-05-08T11:37:12Z-
dc.date.available2023-05-08T11:37:12Z-
dc.date.issued2023-04-04-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/18707-
dc.description.abstractnsider threat refers to the risk caused to an organization's security, assets, or data by individuals who have authorized access to these resources, such as employees, contractors, or partners. The aim of an insider threat is usually to exploit their access to sensitive information or systems to carry out malicious activities, such as stealing intellectual property, financial data, or sensitive information, sabotaging systems, or processes, or committing fraud. This systematic literature analysed the anatomy of insider threat, including its trends and mode of attacks to find the possible solutions by querying various academic literature. Sources of insider threat dataset are revealed in this review paper to ease the challenges of researchers in getting access to insider datasets. In addition, a taxonomy of insider threat current trends is presented in the paper. This review can serve as a benchmark for researchers in proposing a novel insider threat detection methodology and starting point for novice researcheren_US
dc.publisherInternational Journal of Computer Science and Mobile Computingen_US
dc.subjectInsider Threat; Insider Threat Trends; Insider Threat detectionen_US
dc.titleSystematic Literature Review and Metadata Analysis of Insider Threat Detection Mechanismen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
Systematic review and Metadata Analysis.pdf624.96 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.