Guest editorial: Managing insider security threats (MIST 2012 Volume 1)

Kouichi Sakurai, Dieter Gollmann

Research output: Contribution to journalEditorialpeer-review

Abstract

Insider threats are one of the serious hard problems of organizational security because it is often unclear whether or not an actor is an insider, or what we actually mean by "insider". In addition, it is frequently almost impossible to verify if an authorized insider action (authorized at the level of an operational policy) would constitute an insider attack contravening the organizational security policy of an enterprise. Hence, research on how to fight against insider attacks is one of the recent major topics in information security.

Original languageEnglish
Pages (from-to)1-3
Number of pages3
JournalJournal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
Volume3
Issue number4
Publication statusPublished - Dec 2012

All Science Journal Classification (ASJC) codes

  • Computer Science (miscellaneous)
  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Guest editorial: Managing insider security threats (MIST 2012 Volume 1)'. Together they form a unique fingerprint.

Cite this