Managers often focus on external threats mainly due to the difficulties in evaluating the losses from the insider activities. The purpose of the study is to improve the efficient performance of an information security department and a company itself in counteracting insider threats by increasing the accuracy and rate of assessing the insider threat for each employee and ranking employees in accordance with the assessment of a summarized technical threat indicator. The authors morphologically analyze the features of insider activities in three sections and identify a promising area for combating the insiders – a prompt identification of unusual behavior signaling a breach of confidentiality. The paper describes an algorithm developed by the ...
The purpose of this research is to identify the factors that influence organizational insiders to vi...
The greatest asset that any organisation has are its people, but they may also be the greatest threa...
Since 2001, the CERT Insider Threat Center has built an extensive library and comprehensive database...
An insider is a person that has or had a legitimate right to access computing resources of an organi...
Most insider attacks done by people who have the knowledge and technical know-how of launching such ...
Insider threats, or attacks against a company from within, are a pressing issue both domestically an...
An organization is a combination of vision, technology and employees. The well being of organization...
The threat that insiders pose to businesses, institutions and governmental organisations continues t...
In the recent few years, there has been a rise in insider threats. Insider threats are defined as, m...
National Security will always be threatened by individuals internal to the organization in the form ...
Information is probably the most valuable asset of many people and information systems. However, som...
The insider threat faced by corporations and governments today is a real and significant problem, an...
The reason of countries development in industrial and commercial enterprises fields in those countri...
Espionage perpetrated by insiders using information technology (IT) assets continues to vex organiza...
The insider threat faced by corporations and governments today is a real and significant problem, an...
The purpose of this research is to identify the factors that influence organizational insiders to vi...
The greatest asset that any organisation has are its people, but they may also be the greatest threa...
Since 2001, the CERT Insider Threat Center has built an extensive library and comprehensive database...
An insider is a person that has or had a legitimate right to access computing resources of an organi...
Most insider attacks done by people who have the knowledge and technical know-how of launching such ...
Insider threats, or attacks against a company from within, are a pressing issue both domestically an...
An organization is a combination of vision, technology and employees. The well being of organization...
The threat that insiders pose to businesses, institutions and governmental organisations continues t...
In the recent few years, there has been a rise in insider threats. Insider threats are defined as, m...
National Security will always be threatened by individuals internal to the organization in the form ...
Information is probably the most valuable asset of many people and information systems. However, som...
The insider threat faced by corporations and governments today is a real and significant problem, an...
The reason of countries development in industrial and commercial enterprises fields in those countri...
Espionage perpetrated by insiders using information technology (IT) assets continues to vex organiza...
The insider threat faced by corporations and governments today is a real and significant problem, an...
The purpose of this research is to identify the factors that influence organizational insiders to vi...
The greatest asset that any organisation has are its people, but they may also be the greatest threa...
Since 2001, the CERT Insider Threat Center has built an extensive library and comprehensive database...