A great deal of research has been devoted to the exploration and categorization of threats posed from malicious attacks from current employees who are disgruntled with the organisation, or are motivated by financial gain. These so-called “insider threats” pose a growing menace to information security, but given the right mechanisms, they have the potential to be detected and caught. In contrast, human factors related to aspects of poor planning, lack of attention to detail, and ignorance are linked to the rise of the accidental or unintentional insider. In this instance there is no malicious intent and no prior planning for their “attack,” but their actions can be equally as damaging and disruptive to the organisation. This chapter presents...
As implementation of computer systems has continued to grow in business contexts, employee-driven cy...
With computers being a standard part of life now with the evolution of the internet, many aspects of...
Over the years, many cybersecurity breaches have been attributed to human error, considering human f...
Copyright © 2018 by IGI Global. All rights reserved. No part of this publication may be reproduced, ...
The exploitation of so-called insiders is increasingly recognised as a common vector for cyberattack...
AbstractIt is widely acknowledged that employees of an organization are often a weak link in the pro...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
Any organisation is susceptible to a breach of security from outside: hacking, product contamination...
Any organisation is susceptible to a breach of security from outside: hacking, product contamination...
Cyber attacks have been increasingly detrimental to networks, systems, and users, and are increasing...
The threat that insiders pose to businesses, institutions and governmental organisations continues t...
An insider is a person that has or had a legitimate right to access computing resources of an organi...
Human hacking is a nontechnical kind of intrusion that relies heavily on human manipulation. Its imp...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
As implementation of computer systems has continued to grow in business contexts, employee-driven cy...
With computers being a standard part of life now with the evolution of the internet, many aspects of...
Over the years, many cybersecurity breaches have been attributed to human error, considering human f...
Copyright © 2018 by IGI Global. All rights reserved. No part of this publication may be reproduced, ...
The exploitation of so-called insiders is increasingly recognised as a common vector for cyberattack...
AbstractIt is widely acknowledged that employees of an organization are often a weak link in the pro...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
Any organisation is susceptible to a breach of security from outside: hacking, product contamination...
Any organisation is susceptible to a breach of security from outside: hacking, product contamination...
Cyber attacks have been increasingly detrimental to networks, systems, and users, and are increasing...
The threat that insiders pose to businesses, institutions and governmental organisations continues t...
An insider is a person that has or had a legitimate right to access computing resources of an organi...
Human hacking is a nontechnical kind of intrusion that relies heavily on human manipulation. Its imp...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
As implementation of computer systems has continued to grow in business contexts, employee-driven cy...
With computers being a standard part of life now with the evolution of the internet, many aspects of...
Over the years, many cybersecurity breaches have been attributed to human error, considering human f...