DocumentCode
2274559
Title
The Cyber Enemy Within ... Countering the Threat from Malicious Insiders
fYear
2004
fDate
6-10 Dec. 2004
Firstpage
346
Lastpage
347
Abstract
One of the most critical problems facing the information security community is the threat of a malicious insider abusing his computer privileges to modify, remove, or prevent access to an organization\´s data. An insider is considered trusted (at least implicitly) by his organization because he is granted access to its computing environment. Whether or not that insider is in fact trustworthy is a question that lies at the heart of the insider threat problem. Complicating this problem is the fact that there is no "one size fits all" description of a malicious insider. Motivations, objectives, cyber expertise, system privileges all can and do vary from one case to the next.
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Security Applications Conference, 2004. 20th Annual
ISSN
1063-9527
Print_ISBN
0-7695-2252-1
Type
conf
DOI
10.1109/CSAC.2004.39
Filename
1377241
Link To Document