Abstract
Insider threats are one of the serious hard problems of organizational security because it is often unclear whether or not an actor is an insider, or what we actually mean by "insider". In addition, it is frequently almost impossible to verify if an authorized insider action (authorized at the level of an operational policy) would constitute an insider attack contravening the organizational security policy of an enterprise. Hence, research on how to fight against insider attacks is one of the recent major topics in information security.
Original language | English |
---|---|
Pages (from-to) | 1-3 |
Number of pages | 3 |
Journal | Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications |
Volume | 3 |
Issue number | 4 |
Publication status | Published - Dec 2012 |
All Science Journal Classification (ASJC) codes
- Computer Science (miscellaneous)
- Computer Science Applications
- Computer Networks and Communications