DocumentCode
3170883
Title
Understanding insider attack problem and scope in cloud
Author
Gunasekhar, T. ; Rao, K. Thirupathi ; Basu, M. Trinath
Author_Institution
Dept. of CSE, K.L. Univ., Vaddeswaram, India
fYear
2015
fDate
19-20 March 2015
Firstpage
1
Lastpage
6
Abstract
The malicious insider can be an employees, user and/or third party business partner. The insiders can have legitimate access to their organization data centers. In organizations, the security related aspects are based on insider´s behaviors, the malicious insiders may theft sensitive data and no protection mechanisms are addressed till now to completely defend against the attacks. Such that organizational data could be so vulnerable from insider threat attacks. The malicious insiders of an organization can perform stealing on sensitive data at cloud storage as well as at organizational level. The insiders can misuse their credentials in order to perform malicious tasks on sensitive information as they agreed with the competitors of that organization. By doing this, the insiders may get financial benefits from the competitors. The damages of insider threat are: IT sabotages, theft of confidential information, trade secrets and Intellectual properties (IP). It is very important for the nation to start upgrading it´s IT infrastructure and keep up with the latest security guidelines and practices.
Keywords
cloud computing; industrial property; organisational aspects; security of data; storage management; IT infrastructure; IT sabotages; cloud storage; confidential information theft; insider behaviors; insider threat attack problem; intellectual properties; malicious insider; organization data centers; organizational level; security related aspects; trade secrets; Cloud computing; Companies; Computers; Firewalls (computing); Confidential; Insider; Intellectual property; attacks; sabotage;
fLanguage
English
Publisher
ieee
Conference_Titel
Circuit, Power and Computing Technologies (ICCPCT), 2015 International Conference on
Conference_Location
Nagercoil
Type
conf
DOI
10.1109/ICCPCT.2015.7159380
Filename
7159380
Link To Document