TY - JOUR
T1 - Guest editorial
T2 - Managing insider security threats (MIST 2012 Volume 1)
AU - Sakurai, Kouichi
AU - Gollmann, Dieter
PY - 2012/12
Y1 - 2012/12
N2 - Insider threats are one of the serious hard problems of organizational security because it is often unclear whether or not an actor is an insider, or what we actually mean by "insider". In addition, it is frequently almost impossible to verify if an authorized insider action (authorized at the level of an operational policy) would constitute an insider attack contravening the organizational security policy of an enterprise. Hence, research on how to fight against insider attacks is one of the recent major topics in information security.
AB - Insider threats are one of the serious hard problems of organizational security because it is often unclear whether or not an actor is an insider, or what we actually mean by "insider". In addition, it is frequently almost impossible to verify if an authorized insider action (authorized at the level of an operational policy) would constitute an insider attack contravening the organizational security policy of an enterprise. Hence, research on how to fight against insider attacks is one of the recent major topics in information security.
UR - http://www.scopus.com/inward/record.url?scp=84886939675&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84886939675&partnerID=8YFLogxK
M3 - Editorial
AN - SCOPUS:84886939675
VL - 3
SP - 1
EP - 3
JO - Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
JF - Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
SN - 2093-5374
IS - 4
ER -