Page 114 - KDU INTERNATIONAL JOURNAL OF CRIMINAL JUSTICE
P. 114
KDU International Journal of Criminal Justice (KDUIJCJ)
Volume I | Issue II| July 2024
selection of relevant behavioural indicators and the determination of what
constitutes suspicious behaviour will depend on factors such as the
organization's industry, regulatory requirements, and historical incidents.
Collaboration with domain experts, security analysts, and stakeholders is crucial
to ensure that the defined suspicious patterns are meaningful, actionable, and
aligned with the organization's security goals. By continuously refining the
baseline behaviour and updating probabilities based on new evidence, Bayesian
reasoning enables the identification of increasingly accurate and context-aware
suspicious patterns in the behavioural mapping of insider threats and
espionage. This approach enhances the organization's ability to detect and
mitigate potential risks, thereby strengthening its overall security posture.
Indicators
In the context of Bayesian reasoning and behavioural mapping of insider threats
and espionage, indicators play a crucial role in identifying potential risks and
suspicious behaviours. Bayes' theorem provides a framework for updating
probabilities based on new evidence, allowing for the assessment of various
indicators and their contribution to the overall risk assessment. Here are some
indicators that can be considered in the behavioural mapping of insider threats
and espionage.
1. Abnormal Access Patterns:
- Unusual login times: Logins outside of normal working hours or patterns
deviating from an individual's typical login behaviour.
- Unauthorized access attempts: Multiple failed login attempts or access to
restricted systems or sensitive data.
2. Data Exfiltration:
103