Open Access
REVIEW
Implementing a Cybersecurity Continuous User Evaluation Program
1 The Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, SD 57042, USA
2 The Department of Criminal Justice, Auburn University at Montgomery, Montgomery, AL 36124, USA
* Corresponding Author: Jackie McNett. Email:
Journal of Cyber Security 2025, 7, 279-306. https://doi.org/10.32604/jcs.2025.067514
Received 06 May 2025; Accepted 03 July 2025; Issue published 25 July 2025
Abstract
This review explores the implementation and effectiveness of continuous evaluation programs in managing and mitigating insider threats within organizations. Continuous evaluation programs involve the ongoing assessment of individuals’ suitability for access to sensitive information and resources by monitoring their behavior, access patterns, and other indicators in real-time. The review was conducted using a comprehensive search across various academic and professional databases, including IEEE Xplore, SpringerLink, and Google Scholar and papers were selected from a time span of 2015–2023. The review outlines the importance of defining the scope and objectives of such programs, which should include all personnel, contractors, and third-party vendors with access to critical systems. The review also highlights the integration of automated monitoring and alerting tools, such as Security Information and Event Management (SIEM) systems, to enhance real-time threat detection and response. Additionally, the review emphasizes the need to clearly define roles and responsibilities across various organizational levels to ensure program success, while establishing robust policies and procedures for addressing identified risks. The review underscores the importance of compliance with relevant legal and regulatory frameworks, ensuring that the continuous evaluation program does not infringe on privacy or civil liberties. Training and awareness programs are also recommended to maintain user accountability and promote a proactive security culture. Regular updates and reviews of the evaluation program are crucial for adapting to evolving threats and ensuring long-term effectiveness. This review provides organizations with the necessary guidance to implement a comprehensive continuous evaluation system to safeguard against insider threats and maintain robust personnel security.Keywords
Cite This Article
Copyright © 2025 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools