comments on "the insider threat to information systems and the effectiveness of iso17799"...

5
Comments on "The insider threat to information systems and the effectiveness of ISO17799" Marianthi Theoharidou, Spyros Kokolakis, Maria Karyda and Evangelos Kiountouzis. "The insider threat to information systems and the effectiveness of ISO17799." Computers & Security 24, no.6 (2005): 472- 484. Ben Skudder

Upload: cornelius-mcdaniel

Post on 19-Jan-2016

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Comments on "The insider threat to information systems and the effectiveness of ISO17799" Marianthi Theoharidou, Spyros Kokolakis, Maria Karyda and Evangelos

Comments on "The insider threat to information systems and the effectiveness of ISO17799"

Marianthi Theoharidou, Spyros Kokolakis, Maria Karyda and Evangelos Kiountouzis. "The insider threat to information systems and the effectiveness of ISO17799." Computers & Security 24, no.6 (2005): 472-484.

Ben Skudder

Page 2: Comments on "The insider threat to information systems and the effectiveness of ISO17799" Marianthi Theoharidou, Spyros Kokolakis, Maria Karyda and Evangelos

Summary

This paper explores the deficiencies of ISO17799 in addressing insider threats to information systems with reference to modern criminology models.

Page 3: Comments on "The insider threat to information systems and the effectiveness of ISO17799" Marianthi Theoharidou, Spyros Kokolakis, Maria Karyda and Evangelos

Appreciation

• What is the significance of this to computer security specialists?

• Given its popularity a computer security specialist is likely to be working under a standard like this.

• It's an area which has a large impact on computer security.

Page 4: Comments on "The insider threat to information systems and the effectiveness of ISO17799" Marianthi Theoharidou, Spyros Kokolakis, Maria Karyda and Evangelos

Criticism

How can aspects of these models be realised, and how do they relate to the models? With regards to Social Bond Theory:

“the need for management to act as a role model” and its relationship to attachment

commitment and the company “honoring its part of the contract”

Informal controls and their relationship to Social Bond Theory, Social Learning Theory and the Theory of Planned Behaviour.

If these enhancements are supposed to be incorporated into a standard there needs to be a criteria by which we can evaluate a given policy.

Page 5: Comments on "The insider threat to information systems and the effectiveness of ISO17799" Marianthi Theoharidou, Spyros Kokolakis, Maria Karyda and Evangelos

Question

As computer security specialists, to what extent do we need to be aware of security as a social/behavioural problem, either with regards to insider threat in particular or computer security in general?