Defending against insider threats and internal data leakage

Abstract

In the last decade, computer science researchers have been
working hard to prevent attacks against the security of
information systems. Different adversary models have
incarnated the malicious entities against which researchers
have defined security properties, identified security
vulnerabilities, and engineered security defenses. These
adversaries were usually intruders, that is, outsiders trying
to break into a system’s defenses.

Keywords

identity, security, illigal activities, risks, management systems, security technologies, digital identity, administrative privilages

Date of this Version

8-2012

DOI

10.1002/sec.598

Comments

Security and Communication Networks, Vol. 5, Issue 8, pages 831-833.

Share

COinS