Overcoming the insider
نویسندگان
چکیده
منابع مشابه
Overcoming the insider: reducing employee computer crime through situational crime prevention
Northumbria University has developed Northumbria Research Link (NRL) to enable users to access the University’s research output. Copyright © and moral rights for items on NRL are retained by the individual author(s) and/or other copyright owners. Single copies of full items can be reproduced, displayed or performed, and given to third parties in any format or medium for personal research or stu...
متن کاملOvercoming the Fear of Lecture
نقش ما در مراقبتهای بهداشتی، توسعه مهارتهای مراقبتی از بیماران است و این متضمن داشتن قدرت بیان مؤثر است، این قدرت بیان را نه تنها در جمع همکاران بلکه باید در جلسات نیز داشت، آنهم نه در برابر پنج نفر بلکه در برابر پانصد نفر، که این تسلط بیان را نه تنها هنگامی که شرایط مساعد است، بلکه به هنگام مناقشه و جر و بحث نیز باید دارا بود.
متن کاملReflections on the Insider Threat
This paper reports on a workshop in June 2007 on the topic of the insider threat. Attendees represented academia and research institutions, consulting firms, industry—especially the financial services sector, and government. Most participants were from the United States. Conventional wisdom asserts that insiders account for roughly a third of the computer security loss. Unfortunately, there is ...
متن کاملDealing with the Malicious Insider
This paper looks at a number of issues relating to the malicious insider and the nature of motivation, loyalty and the type of attacks that occur. The paper also examines the changing environmental, social, cultural and business issues that have resulted in an increased exposure to the insider threat. The paper then discusses a range of measures that can be taken to reduce both the likelihood o...
متن کاملHoneypots: Catching the Insider Threat
In the past several years there has been extensive research into honeypot technologies, primarily for detection and information gathering against external threats. However, little research has been done for one of the most dangerous threats, the advance insider, the trusted individual who knows your internal organization. These individuals are not after your systems, they are after your informa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Communications of the ACM
سال: 2009
ISSN: 0001-0782,1557-7317
DOI: 10.1145/1562164.1562198