Identifying and Managing Internal Security Threats in Enterprise Systems

نویسنده

  • Gavin Hall
چکیده

Modern companies increasingly rely on technology to manage every facet of their business, with a significant concern being the security of this technology. Nowhere is the issue of security more important than in the area of corporate systems networks. With the greater dependence on technology and network has come the greater need for competent security to safeguard the corporate network systems and its valuable information and infrastructure. Much of industry extensively develops security approaches for these vital systems to protect against external security threats that come from outside the corporate network. It is becoming increasingly apparent that there is a more ominous threat, one which seems to garner the least attention but with the potential for catastrophic results if not dealt with. This more serious threat is that of insider security breaches, corruption and exploitation. This paper examines the topic of enterprise security, providing a historical overview from past advancements to present developments, and then offers possible solutions for a standard protocol to ensure secure systems. As systems and the potential for losses grow, the security in place should develop along with it. Development should be made that treats the potential vulnerability a company has against insider threat.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

TDDC03 Projects, Spring 2006 A Comparison of Attack Trees Threat Modeling and OCTAVE

Avoidance and discovery of security vulnerabilities in information systems and managing enterprises requires awareness of typical risks and a good understanding of vulnerabilities and threats and their exploitations. Various methods for characterizing, identifying and managing threats have been presented. Bruce Schneier has invented the Attack Trees, Microsoft call their method Threat Modeling ...

متن کامل

Identifying Information Security Risk Components in Military Hospitals in Iran

Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...

متن کامل

Users as the Biggest Threats to Security of Health Information Systems

There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...

متن کامل

A Reuse-Based Approach to Determining Security Requirements

The paper proposes a reuse-based approach to determining security requirements. Development for reuse involves identifying security threats and associated security requirements during application development and abstracting them into a repository of generic threats and requirements. Development with reuse involves identifying security assets, setting security goals for each asset, identifying t...

متن کامل

Proposed methodology to enhance C4I systems security on architectural level

Command control, communication, computer and intelligence (C4I) systems are the back bone complex information and communication systems for modern information warfare (IW). Managing security in C4I systems is a challenge due to complexity and criticality of these systems. This paper elaborates design methodology to incorporate security in the C4I systems in systematic and consistent way instead...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009