DocumentCode :
2274559
Title :
The Cyber Enemy Within ... Countering the Threat from Malicious Insiders
fYear :
2004
fDate :
6-10 Dec. 2004
Firstpage :
346
Lastpage :
347
Abstract :
One of the most critical problems facing the information security community is the threat of a malicious insider abusing his computer privileges to modify, remove, or prevent access to an organization\´s data. An insider is considered trusted (at least implicitly) by his organization because he is granted access to its computing environment. Whether or not that insider is in fact trustworthy is a question that lies at the heart of the insider threat problem. Complicating this problem is the fact that there is no "one size fits all" description of a malicious insider. Motivations, objectives, cyber expertise, system privileges all can and do vary from one case to the next.
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 2004. 20th Annual
ISSN :
1063-9527
Print_ISBN :
0-7695-2252-1
Type :
conf
DOI :
10.1109/CSAC.2004.39
Filename :
1377241
Link To Document :
بازگشت