Open Access iconOpen Access

REVIEW

crossmark

Implementing a Cybersecurity Continuous User Evaluation Program

Josh McNett1, Jackie McNett2,*

1 The Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, SD 57042, USA
2 The Department of Criminal Justice, Auburn University at Montgomery, Montgomery, AL 36124, USA

* Corresponding Author: Jackie McNett. Email: email

Journal of Cyber Security 2025, 7, 279-306. https://doi.org/10.32604/jcs.2025.067514

Abstract

This review explores the implementation and effectiveness of continuous evaluation programs in managing and mitigating insider threats within organizations. Continuous evaluation programs involve the ongoing assessment of individuals’ suitability for access to sensitive information and resources by monitoring their behavior, access patterns, and other indicators in real-time. The review was conducted using a comprehensive search across various academic and professional databases, including IEEE Xplore, SpringerLink, and Google Scholar and papers were selected from a time span of 2015–2023. The review outlines the importance of defining the scope and objectives of such programs, which should include all personnel, contractors, and third-party vendors with access to critical systems. The review also highlights the integration of automated monitoring and alerting tools, such as Security Information and Event Management (SIEM) systems, to enhance real-time threat detection and response. Additionally, the review emphasizes the need to clearly define roles and responsibilities across various organizational levels to ensure program success, while establishing robust policies and procedures for addressing identified risks. The review underscores the importance of compliance with relevant legal and regulatory frameworks, ensuring that the continuous evaluation program does not infringe on privacy or civil liberties. Training and awareness programs are also recommended to maintain user accountability and promote a proactive security culture. Regular updates and reviews of the evaluation program are crucial for adapting to evolving threats and ensuring long-term effectiveness. This review provides organizations with the necessary guidance to implement a comprehensive continuous evaluation system to safeguard against insider threats and maintain robust personnel security.

Keywords

Insider threats; security; evaluation program; continuous monitoring; user behavior analytics; SIEM

Cite This Article

APA Style
McNett, J., McNett, J. (2025). Implementing a Cybersecurity Continuous User Evaluation Program. Journal of Cyber Security, 7(1), 279–306. https://doi.org/10.32604/jcs.2025.067514
Vancouver Style
McNett J, McNett J. Implementing a Cybersecurity Continuous User Evaluation Program. J Cyber Secur. 2025;7(1):279–306. https://doi.org/10.32604/jcs.2025.067514
IEEE Style
J. McNett and J. McNett, “Implementing a Cybersecurity Continuous User Evaluation Program,” J. Cyber Secur., vol. 7, no. 1, pp. 279–306, 2025. https://doi.org/10.32604/jcs.2025.067514



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 739

    View

  • 453

    Download

  • 0

    Like

Share Link