Insider threats are one of the serious hard problems of organizational security because it is often unclear whether or not an actor is an insider, or what we actually mean by "insider". In addition, it is frequently almost impossible to verify if an authorized insider action (authorized at the level of an operational policy) would constitute an insider attack contravening the organizational security policy of an enterprise. Hence, research on how to fight against insider attacks is one of the recent major topics in information security.
|Number of pages||3|
|Journal||Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications|
|Publication status||Published - Dec 2012|
All Science Journal Classification (ASJC) codes
- Computer Science (miscellaneous)
- Computer Science Applications
- Computer Networks and Communications