Adaptive User Behavior Risk Scoring Model an Approach to The Security Risk Analysis and Control Specification of Computer User

Sutedja, Krisdian Eko and Mashudi, Mulya R. and Lim, Charles (2016) Adaptive User Behavior Risk Scoring Model an Approach to The Security Risk Analysis and Control Specification of Computer User. Masters thesis, Swiss German University.

[img]
Preview
Text
Krisdian Sutedja 22015112 TOC.pdf

Download (1MB) | Preview
[img] Text
Krisdian Sutedja 22015112 1.pdf
Restricted to Registered users only

Download (1MB)
[img] Text
Krisdian Sutedja 22015112 2.pdf
Restricted to Registered users only

Download (4MB)
[img] Text
Krisdian Sutedja 22015112 3.pdf
Restricted to Registered users only

Download (1MB)
[img] Text
Krisdian Sutedja 22015112 4.pdf
Restricted to Registered users only

Download (8MB)
[img] Text
Krisdian Sutedja 22015112 5.pdf
Restricted to Registered users only

Download (913kB)
[img]
Preview
Text
Krisdian Sutedja 22015112 Ref.pdf

Download (795kB) | Preview

Abstract

When people say, “Your company worst security vulnerability is still located between the keyboard and the chair”, it shows how even until today, there is still the ever- daunting tasks concerning information security that must be faced by any organizations, which is not to fall victim to the weakest link regarding the information security – the human factor. More efforts were invested by the organization into technology development and enhancement, rather than focusing on the people and processes aspects. But actually, the important component in doing the protection regarding the organization’s assets is the understanding of the “Enemy”. The organization should no longer only focus on the technological perspective of the information security. We also need to have the “Insider knowledge” in order to do user behavior analysis effectively. This research main contribution is that the proposed model would help the organization to get the visibility in order to effectively identify potential fraudulent computer users and the risks by applying risk-based approach to analyze the collected user activities data in finding computer users with the high risk level, and to define applicable security risk controls in order to mitigate the risks which come from the computer user behavior.

Item Type: Thesis (Masters)
Uncontrolled Keywords: Risk Scoring; User Behavior; Risk Control; ISO/IEC 27002; Computer User.
Subjects: T Technology > T Technology (General) > T58.5 Information technology
Divisions: Faculty of Engineering and Information Technology > Department of Information Technology
Depositing User: Atroridho Rizky
Date Deposited: 13 Jul 2020 15:13
Last Modified: 13 Jul 2020 15:13
URI: http://repository.sgu.ac.id/id/eprint/1145

Actions (login required)

View Item View Item