Identifying and Mitigating Insider Threats
Abstract
Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats.
Zusammenfassung
Organisationen sind mit vielfältigen Bedrohungen konfrontiert, die grob in Innenbedrohungen und Außenbedrohungen eingeteilt werden können. Bedrohungen durch Innentäter sind besonders schwer zu verhindern, da Innentäter besondere Kenntnis und Rechte haben. Daher sind bösartige Handlungen von Innentätern schwer von gutartigen Handlungen zu unterscheiden. Im Anschluss an die Definition der Begriffe Innentäter und Innenbedrohung gibt dieser Artikel einen Überblick über Maßnahmen gegen Innenbedrohungen und diskutiert widersprüchliche Ziele bei der Bekämpfung von Innenbedrohungen.
© by Oldenbourg Wissenschaftsverlag, Kongens Lyngby, Germany
Articles in the same Issue
- Cloud Computing
- Cloud Computing — An Industry Perspective
- Grid vs Cloud — A Technology Comparison
- WSO2 Stratos: An Application Stack to Support Cloud Computing
- Composite as a Service: Cloud Application Structures, Provisioning, and Management
- A Framework for Studying Cloud Value Systems
- Identifying and Mitigating Insider Threats
- An Approach to XML Information Retrieval in Distributed Systems
Articles in the same Issue
- Cloud Computing
- Cloud Computing — An Industry Perspective
- Grid vs Cloud — A Technology Comparison
- WSO2 Stratos: An Application Stack to Support Cloud Computing
- Composite as a Service: Cloud Application Structures, Provisioning, and Management
- A Framework for Studying Cloud Value Systems
- Identifying and Mitigating Insider Threats
- An Approach to XML Information Retrieval in Distributed Systems