Research on Mitigating the Insider Threat to Information Systems - #2

Proceedings of a Workshop Held August, 2000

Robert H. Anderson, Thomas Bozek, Tom Longstaff, Wayne Meitzler, Michael Skroch, Ken Van Wyk

ResearchPublished Jan 1, 2000

This is the second in a series of conference reports on the topic of R&D initiatives to mitigate and thwart the insider threat to critical U.S. defense and infrastructure information systems. (The first conference, held August 1999, is reported on in RAND/CF-151-OSD.) This August 2000 workshop's three main focus areas were long-term (2-5 year) research challenges and goals toward mitigating the insider threat; developing insider threat models; and developing near-term solutions using commercial off-the-shelf(COTS) and government off-the-shelf (GOTS) products. The long-term research recommendations stressed the need to develop an underlying system architecture designed explicitly with security and survivability in mind (unlike essentially all operating systems and network architectures in use today). Other topics included R&D needed on differential access controls, means of recording and saving the provenance of a digital document, and dealing with the increasing use of mobile code (e.g., in the form of applets, viruses, worms, or macros) in complex information systems. The report also contains a number of recommendations regarding the purposes and design of models of insider behavior, and near-term recommendations for helping to prevent, discover, and mitigate the threat ofinsider misuse of information systems.

Order a Print Copy

Format
Paperback
Page count
134 pages
List Price
$35.00
Buy link
Add to Cart

Topics

Document Details

  • Availability: Available
  • Year: 2000
  • Print Format: Paperback
  • Paperback Pages: 134
  • Paperback Price: $35.00
  • Paperback ISBN/EAN: 978-0-8330-2962-1
  • DOI: https://doi.org/10.7249/CF163
  • Document Number: CF-163-DARPA

Citation

RAND Style Manual
Anderson, Robert H., Thomas Bozek, Tom Longstaff, Wayne Meitzler, Michael Skroch, and Ken Van Wyk, Research on Mitigating the Insider Threat to Information Systems - #2: Proceedings of a Workshop Held August, 2000, RAND Corporation, CF-163-DARPA, 2000. As of October 15, 2024: https://www.rand.org/pubs/conf_proceedings/CF163.html
Chicago Manual of Style
Anderson, Robert H., Thomas Bozek, Tom Longstaff, Wayne Meitzler, Michael Skroch, and Ken Van Wyk, Research on Mitigating the Insider Threat to Information Systems - #2: Proceedings of a Workshop Held August, 2000. Santa Monica, CA: RAND Corporation, 2000. https://www.rand.org/pubs/conf_proceedings/CF163.html. Also available in print form.
BibTeX RIS

The study was under the auspices of RAND's National Security Research Division.

This publication is part of the RAND conference proceeding series. Conference proceedings present a collection of papers delivered at a conference or a summary of the conference.

This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.

RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.