• DocumentCode
    3170883
  • Title

    Understanding insider attack problem and scope in cloud

  • Author

    Gunasekhar, T. ; Rao, K. Thirupathi ; Basu, M. Trinath

  • Author_Institution
    Dept. of CSE, K.L. Univ., Vaddeswaram, India
  • fYear
    2015
  • fDate
    19-20 March 2015
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    The malicious insider can be an employees, user and/or third party business partner. The insiders can have legitimate access to their organization data centers. In organizations, the security related aspects are based on insider´s behaviors, the malicious insiders may theft sensitive data and no protection mechanisms are addressed till now to completely defend against the attacks. Such that organizational data could be so vulnerable from insider threat attacks. The malicious insiders of an organization can perform stealing on sensitive data at cloud storage as well as at organizational level. The insiders can misuse their credentials in order to perform malicious tasks on sensitive information as they agreed with the competitors of that organization. By doing this, the insiders may get financial benefits from the competitors. The damages of insider threat are: IT sabotages, theft of confidential information, trade secrets and Intellectual properties (IP). It is very important for the nation to start upgrading it´s IT infrastructure and keep up with the latest security guidelines and practices.
  • Keywords
    cloud computing; industrial property; organisational aspects; security of data; storage management; IT infrastructure; IT sabotages; cloud storage; confidential information theft; insider behaviors; insider threat attack problem; intellectual properties; malicious insider; organization data centers; organizational level; security related aspects; trade secrets; Cloud computing; Companies; Computers; Firewalls (computing); Confidential; Insider; Intellectual property; attacks; sabotage;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Circuit, Power and Computing Technologies (ICCPCT), 2015 International Conference on
  • Conference_Location
    Nagercoil
  • Type

    conf

  • DOI
    10.1109/ICCPCT.2015.7159380
  • Filename
    7159380