In recent years the Internet connection has become a frequent point of attack for most organisations. However, the loss due to insider misuse is far greater than the loss due to external abuse. This paper focuses on the problem of insider misuse, the scale of it, and how it has effected the organisations. The paper also discusses why access controls alone cannot be used to address the problem, and proceeds to consider how techniques currently associated with Intrusion Detection Systems can potentially be applied for insider misuse detection. General guidelines for countermeasures against insider misuse are also provided to protect data and systems
Most computerized information systems we use in our everyday lives provide very little protection ag...
Numerous studies indicate that amongst the various types of security threats, the problem of insider...
The main problem the IPRO addressed was that of insider misuse. Contrary to popular belief, the larg...
In recent years the Internet connection has become a frequent point of attack for most organisations...
In recent years the Internet connection has become a frequent point of attack for most organisations...
Intrusion Detection Systems (IDS) have been widely deployed within many organisations' IT nenvorks t...
The main problem the IPRO addressed was that of insider misuse. Contrary to popular belief, the larg...
The main problem the IPRO addressed was that of insider misuse. Contrary to popular belief, the larg...
There are few, if any, organizations immune to the adverse and costly effects of successful informat...
This paper looks at a number of issues relating to the malicious insider and the nature of motivatio...
The ever increasing computerization of business processes and mission critical applications, combine...
The main problem the IPRO addressed was that of insider misuse. Contrary to popular belief, the larg...
Part 2: Intrusion DetectionInternational audienceIT departments of organisations go to great lengths...
The popularity of mobile devices, wearable devices used in collaborative information systems, has d...
Threats from the inside of an organization’s perimeters are a significant problem, since it is diffi...
Most computerized information systems we use in our everyday lives provide very little protection ag...
Numerous studies indicate that amongst the various types of security threats, the problem of insider...
The main problem the IPRO addressed was that of insider misuse. Contrary to popular belief, the larg...
In recent years the Internet connection has become a frequent point of attack for most organisations...
In recent years the Internet connection has become a frequent point of attack for most organisations...
Intrusion Detection Systems (IDS) have been widely deployed within many organisations' IT nenvorks t...
The main problem the IPRO addressed was that of insider misuse. Contrary to popular belief, the larg...
The main problem the IPRO addressed was that of insider misuse. Contrary to popular belief, the larg...
There are few, if any, organizations immune to the adverse and costly effects of successful informat...
This paper looks at a number of issues relating to the malicious insider and the nature of motivatio...
The ever increasing computerization of business processes and mission critical applications, combine...
The main problem the IPRO addressed was that of insider misuse. Contrary to popular belief, the larg...
Part 2: Intrusion DetectionInternational audienceIT departments of organisations go to great lengths...
The popularity of mobile devices, wearable devices used in collaborative information systems, has d...
Threats from the inside of an organization’s perimeters are a significant problem, since it is diffi...
Most computerized information systems we use in our everyday lives provide very little protection ag...
Numerous studies indicate that amongst the various types of security threats, the problem of insider...
The main problem the IPRO addressed was that of insider misuse. Contrary to popular belief, the larg...