• DocumentCode
    2274559
  • Title

    The Cyber Enemy Within ... Countering the Threat from Malicious Insiders

  • fYear
    2004
  • fDate
    6-10 Dec. 2004
  • Firstpage
    346
  • Lastpage
    347
  • Abstract
    One of the most critical problems facing the information security community is the threat of a malicious insider abusing his computer privileges to modify, remove, or prevent access to an organization\´s data. An insider is considered trusted (at least implicitly) by his organization because he is granted access to its computing environment. Whether or not that insider is in fact trustworthy is a question that lies at the heart of the insider threat problem. Complicating this problem is the fact that there is no "one size fits all" description of a malicious insider. Motivations, objectives, cyber expertise, system privileges all can and do vary from one case to the next.
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Security Applications Conference, 2004. 20th Annual
  • ISSN
    1063-9527
  • Print_ISBN
    0-7695-2252-1
  • Type

    conf

  • DOI
    10.1109/CSAC.2004.39
  • Filename
    1377241