Defending against insider threats and internal data leakage
Abstract
In the last decade, computer science researchers have been
working hard to prevent attacks against the security of
information systems. Different adversary models have
incarnated the malicious entities against which researchers
have defined security properties, identified security
vulnerabilities, and engineered security defenses. These
adversaries were usually intruders, that is, outsiders trying
to break into a system’s defenses.
Keywords
identity, security, illigal activities, risks, management systems, security technologies, digital identity, administrative privilages
Date of this Version
8-2012
DOI
10.1002/sec.598
Comments
Security and Communication Networks, Vol. 5, Issue 8, pages 831-833.