Articles with "insider threats" as a keyword



Photo by avawburton from unsplash

Redefining insider threats: a distinction between insider hazards and insider threats

Sign Up to like & get
recommendations!
Published in 2020 at "Security Journal"

DOI: 10.1057/s41284-020-00259-x

Abstract: This article suggests a new definition of insiders and insider threats. It refrains from applying a harm-oriented perspective that concentrates on the insider’s intention to cause harm because it defines the insider threat either too… read more here.

Keywords: hazards insider; insider threats; privilege; redefining insider ... See more keywords
Photo by radowanrehan from unsplash

The dark triad and insider threats in cyber security

Sign Up to like & get
recommendations!
Published in 2020 at "Communications of the ACM"

DOI: 10.1145/3408864

Abstract: Tracing the relationship between pathological personality traits and insider cyber sabotage. read more here.

Keywords: triad insider; threats cyber; cyber security; dark triad ... See more keywords
Photo by bvp from unsplash

Techniques and countermeasures for preventing insider threats

Sign Up to like & get
recommendations!
Published in 2022 at "PeerJ Computer Science"

DOI: 10.7717/peerj-cs.938

Abstract: With the wide use of technologies nowadays, various security issues have emerged. Public and private sectors are both spending a large portion of their budget to protect the confidentiality, integrity, and availability of their data… read more here.

Keywords: countermeasures preventing; insider; insider threat; insider threats ... See more keywords