Secure team composition to thwart insider threats and cyber-espionage

Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme

Research output: Contribution to journalArticlepeer-review

8 Scopus citations

Abstract

We develop a formal nondeterministic game model for secure team composition to counter cyber-espionage and to protect organizational secrets against an attacker who tries to sidestep technical securitymechanisms by offering a bribe to a project team member. The game captures the adversarial interaction between the attacker and the project manager who has a secret she wants to protect but must share with a team of individuals selected from within her organization. Our interdisciplinary work is important in the face of the multipronged approaches utilized by well-motivated attackers to circumvent the fortifications of otherwise well-defended targets.

Original languageEnglish
Article number2663499
JournalACM Transactions on Internet Technology
Volume14
Issue number2-3
DOIs
StatePublished - 1 Oct 2014
Externally publishedYes

Keywords

  • Access control
  • Cyber-espionage
  • Game theory
  • Human factor
  • Insider threat
  • Management of information security

Fingerprint

Dive into the research topics of 'Secure team composition to thwart insider threats and cyber-espionage'. Together they form a unique fingerprint.

Cite this