Insider threats in information security categories and approaches
Nebrase Elmrabit
Shuang-Hua Yang
Lili Yang
2134/21482
https://repository.lboro.ac.uk/articles/conference_contribution/Insider_threats_in_information_security_categories_and_approaches/9401207
© 2015 Chinese Automation and Computing Society in the UK - CACS. The main concern of most security experts in the last years is the need to mitigate insider threats. However, leaking and selling data these days is easier than before; with the use of the invisible web, insiders can leak confidential data while remaining anonymous. In this paper, we give an overview of the various basic characteristics of insider threats. We also consider current approaches and controls to mitigating the level of such threats by broadly classifying them into two categories.
2016-06-06 10:17:40
Insider threats
Data leaking
Privileged user abuse
Insider attacks
Insider predictions
Business and Management not elsewhere classified