z-logo
open-access-imgOpen Access
Enhanced Approach of Risk Assessment for Insider Threats Detection in Smart Manufacturing
Author(s) -
Nurul Akmal Hashim,
Zaheera Zainal Abidin,
Zuraida Abal Abas,
Nurul Azma Zakaria,
Rohaizah Ahmad,
E. Mardaid
Publication year - 2020
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/864/1/012053
Subject(s) - supply chain , insider , computer science , dashboard , big data , analytics , factory (object oriented programming) , cloud computing , ideal (ethics) , risk analysis (engineering) , computer security , software , business , data science , data mining , marketing , philosophy , epistemology , programming language , operating system , political science , law
The smart manufacturing integrates Internet of Things (IoT), cloud systems, data analytics and machine learning for autonomous implementation particularly in the factory’s supply chain. The additional components from Information Technology (IT) gives convenience accessibility in spike of welcomed threats from inside or outside the boundary to do harmful events. The valuable information in smart manufacturing consists of intellectual property (IP), assets (hardware and software) data and human talent that lead to data theft and illegal activities due to its monetary values. However, little work is done on assessing risks invaluable information particularly threats from inside. In fact, studies on risk assessments are focusing on financial profit, supply chain production and IT assets. Therefore, an enhanced approach of risk assessment for insider threat detection (RAFITD) is introduced. The proposed approach contributes to a log monitoring of the log on and log out activities, based on the role of employee on a software dashboard. From the result, the log monitoring produces two scenarios, which is the ideal and non-ideal. For the ideal scenario, a balanced ratio between log on and log out is accomplished. Meanwhile, a non-ideal scenario performs an imbalance ratio. The impact of the study brings an insider threat detection for better analysis.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here