ASSESSMENT OF INSIDER THREATS IN THE PERSONNEL SECURITY SYSTEM OF THE ORGANIZATION
Abstract and keywords
Abstract (English):
The article discusses the problems and ways of solving insider threats in the organization's per-sonnel security system, proves that at the same time the organization’s personnel needs protec-tion, and can act as a source of threats and dangers. The necessity of using a methodology for assessing insider threats in the personnel security system based on the identification of a group of insiders: actual employees, previously released personnel, business partners and other users is sub-stantiated.

Keywords:
insider threats, economic security, proprietary information, personnel security, personnel
References

1. Ivashkina, A. V. Ugrozy v kadrovoy bezopasnosti i metody po ih predotvrascheniyu / A. V. Ivashkina, U. P. Lebedeva // Evraziyskiy soyuz uchenyh. - 2018. - № 4-6(49). - S. 71-77.

2. Meshkova, I. V. Kadrovaya bezopasnost' v sisteme nacional'noy bezopasnosti Rossii / I. V. Meshkova // Missiya konfessiy. - 2021. - T. 10. - № 8(57). - S. 907-913.

3. Molchanov, M. A. Kadrovaya bezopasnost' kak element ekonomicheskoy bezopasnosti pred-priyatiy proizvodstvennyh otrasley / M. A. Molchanov // Mir sovremennoy nauki. - 2014. - № 3(25). - S. 71-73.

4. Utechki dannyh v Rossii. URL: https://www.tadviser.ru/index.php (data obrascheniya: 10.10.2022)

5. DWP Personnel Security Policy.- URL: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1050599/dwp-personnel-security-policy-version-2.pdf (data obrascheniya: 10.09.2022)

6. Ko, Li & Divakaran, Dinil Mon & Liau, Yung & Thing, Vrizlynn. (2016). Insider Threat Detec-tion and its Future Directions. International Journal of Security and Networks. 12.https://doi.org/10.1504/IJSN.2017.10005217.

7. Koizumi, Hideaki. (2015). Engineering for Human Security and Well-Being. Engineering. 1. 282.https://doi.org/10.15302/J-ENG-2015066.

8. La identificación del sujeto-objeto de amenazas a la seguridad personal / Svetlana V. LOBOVA; Aleksei V. BOGOVIZ // Espacios. Vol. 39 (Number 24). Year 2018.Page 34. - URL: https://www.revistaespacios.com/a18v39n24/a18v39n24p34.pdf (data obrascheniya: 15.09.2022)

9. Mazzarolo, Guerrino & Jurcut, Anca. (2019). Insider threats in Cyber Security: The enemy within the gates.

10. Research on Behavior-Based Data Leakage Incidents for the Sustainable Growth of an Organiza-tion / Jawon Kim, Jaesoo Kim and Hangbae Chang. - DOI:https://doi.org/10.3390/su12156217 // Sustainabil-ity. - 2020. - 12, 6217.

11. Fan, Wenjun & Lwakatare, Kevin & Rong, Rong. (2017). Social Engineering: I-E based Model of Human Weakness for Attack and Defense Investigations. International Journal of Computer Network and Information Security. 09. 1-11.https://doi.org/10.5815/ijcnis.2017.01.01.

Login or Create
* Forgot password?