Title :
Understanding insider attack problem and scope in cloud
Author :
Gunasekhar, T. ; Rao, K. Thirupathi ; Basu, M. Trinath
Author_Institution :
Dept. of CSE, K.L. Univ., Vaddeswaram, India
Abstract :
The malicious insider can be an employees, user and/or third party business partner. The insiders can have legitimate access to their organization data centers. In organizations, the security related aspects are based on insider´s behaviors, the malicious insiders may theft sensitive data and no protection mechanisms are addressed till now to completely defend against the attacks. Such that organizational data could be so vulnerable from insider threat attacks. The malicious insiders of an organization can perform stealing on sensitive data at cloud storage as well as at organizational level. The insiders can misuse their credentials in order to perform malicious tasks on sensitive information as they agreed with the competitors of that organization. By doing this, the insiders may get financial benefits from the competitors. The damages of insider threat are: IT sabotages, theft of confidential information, trade secrets and Intellectual properties (IP). It is very important for the nation to start upgrading it´s IT infrastructure and keep up with the latest security guidelines and practices.
Keywords :
cloud computing; industrial property; organisational aspects; security of data; storage management; IT infrastructure; IT sabotages; cloud storage; confidential information theft; insider behaviors; insider threat attack problem; intellectual properties; malicious insider; organization data centers; organizational level; security related aspects; trade secrets; Cloud computing; Companies; Computers; Firewalls (computing); Confidential; Insider; Intellectual property; attacks; sabotage;
Conference_Titel :
Circuit, Power and Computing Technologies (ICCPCT), 2015 International Conference on
Conference_Location :
Nagercoil
DOI :
10.1109/ICCPCT.2015.7159380