Abstract
The main concern of most security experts in the last years is the need to mitigate insider threats. However, leaking and selling data these days is easier than before; with the use of the invisible web, insiders can leak confidential data while remaining anonymous. In this paper, we give an overview of the various basic characteristics of insider threats. We also consider current approaches and controls to mitigating the level of such threats by broadly classifying them into two categories.
Original language | English |
---|---|
Title of host publication | 2015 21st International Conference on Automation and Computing (ICAC) |
Publisher | IEEE |
Pages | 1-6 |
Number of pages | 6 |
ISBN (Electronic) | 9780992680114 |
ISBN (Print) | 9780992680107 |
DOIs | |
Publication status | Published - 2 Nov 2015 |
Keywords
- Insider threats
- data leaking
- insider attacks
- insider predictions
- privileged user abuse
ASJC Scopus subject areas
- Control and Systems Engineering
- Computer Networks and Communications
- Computer Science Applications
- Modelling and Simulation