z-logo
open-access-imgOpen Access
Insider Threats
Author(s) -
Anil Rana,
Upasaigam,
Deepak Jain
Publication year - 2012
Publication title -
iars international research journal
Language(s) - English
Resource type - Journals
eISSN - 2202-2821
pISSN - 1839-6518
DOI - 10.51611/iars.irj.v2i1.2012.18
Subject(s) - insider , insider threat , computer security , information security , information security management , business , government (linguistics) , component (thermodynamics) , information sensitivity , internet privacy , security information and event management , computer science , risk analysis (engineering) , cloud computing security , cloud computing , linguistics , philosophy , physics , political science , law , thermodynamics , operating system
Information security is an essential component and assets for any organization, whether it is commercial government or proprietary business. Report after report keeps pointing to the “insider threat” as one of the greatest information security risks within the modern organization. But what exactly is the insider threat and how we can help reduce this risk? This paper analyzes the importance of information security, benefits of it and how the information can be protected by the various threats which are inside the organization, and may leads to information loss. The aim of this paper is to allow businesses, administrators, developers and designers to produce and provide with some methods or techniques to secure such information so that the risk associated with the information loss can be minimized. In this paper we will break down the various attributes of the insider threat, and suggest some methods have been suggested which can help an organization to secure the sensitive and crucial information.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here