Mitigation Strategies for Unintentional Insider Threats on Information Leaks
نویسندگان
چکیده
منابع مشابه
10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response
This article summarizes the objectives and structure of a seminar with the same title, held from August 22nd to 26th, 2010, at Schloss Dagstuhl, Germany. The seminar brought together researchers and policy-makers from quite diverse communities, to make progress towards an integrated framework for understanding insider threats and their interaction with organizations and policies. During the sem...
متن کاملControlling insider threats with information security policies
Over the past decade, several studies, industry reports and surveys have revealed that insider threats constitute a significant role in information security. Following the literature, we categorized insider threats as intentional and unintentional. Computer misuse and fraud are considered as the two most common intentional threats, whereas, user errors and negligence are considered as the two m...
متن کاملCompetitive Threats, Information Asymmetry, and Insider Trading
This paper provides evidence that intensified product market competition increases information asymmetry between corporate insiders and investors. I use volume and gains from insider trading as proxies for information asymmetry. I show that when a firm faces competitive threats insiders purchase and sell more stocks and their trading better predicts future stock returns and long-term profitabil...
متن کاملAddressing Insider Threats and Information Leakage
Insider threats are one of the problems of organizational security that are most difficult to handle. It is often unclear whether or not an actor is an insider, or what we actually mean by “insider”. It also is often impossible to determine whether an insider action is permissible, or whether it constitutes an insider attack. From a technical standpoint, the biggest concern is the discriminatio...
متن کاملUnintentional and Hidden Information Leaks in Networked Software Applications
Side channels are vulnerabilities that can be attacked by observing the behaviour of applications and by inferring sensitive information just from this behaviour. Because side channel vulnerabilities appear in such a large spectrum of contexts, there does not seem to be a generic way to prevent all side channel attacks once and for all. A practical approach is to research for new side channels ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Security and Its Applications
سال: 2018
ISSN: 1738-9976,1738-9976
DOI: 10.14257/ijsia.2018.12.1.03