Overcoming the insider

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Overcoming the insider: reducing employee computer crime through situational crime prevention

Northumbria University has developed Northumbria Research Link (NRL) to enable users to access the University’s research output. Copyright © and moral rights for items on NRL are retained by the individual author(s) and/or other copyright owners. Single copies of full items can be reproduced, displayed or performed, and given to third parties in any format or medium for personal research or stu...

متن کامل

Overcoming the Fear of Lecture

نقش ما در مراقبتهای بهداشتی، توسعه مهارتهای مراقبتی از بیماران است و این متضمن داشتن قدرت بیان مؤثر است، این قدرت بیان را نه تنها در جمع همکاران بلکه باید در جلسات نیز داشت، آنهم نه در برابر پنج نفر بلکه در برابر پانصد نفر، که این تسلط بیان را نه تنها هنگامی که شرایط مساعد است، بلکه به هنگام مناقشه و جر و بحث نیز  باید دارا بود.

متن کامل

Reflections on the Insider Threat

This paper reports on a workshop in June 2007 on the topic of the insider threat. Attendees represented academia and research institutions, consulting firms, industry—especially the financial services sector, and government. Most participants were from the United States. Conventional wisdom asserts that insiders account for roughly a third of the computer security loss. Unfortunately, there is ...

متن کامل

Dealing with the Malicious Insider

This paper looks at a number of issues relating to the malicious insider and the nature of motivation, loyalty and the type of attacks that occur. The paper also examines the changing environmental, social, cultural and business issues that have resulted in an increased exposure to the insider threat. The paper then discusses a range of measures that can be taken to reduce both the likelihood o...

متن کامل

Honeypots: Catching the Insider Threat

In the past several years there has been extensive research into honeypot technologies, primarily for detection and information gathering against external threats. However, little research has been done for one of the most dangerous threats, the advance insider, the trusted individual who knows your internal organization. These individuals are not after your systems, they are after your informa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Communications of the ACM

سال: 2009

ISSN: 0001-0782,1557-7317

DOI: 10.1145/1562164.1562198