Author :
Predd, Joel ; Pfleeger, Shari Lawrence ; Hunker, Jeffrey ; Bulford, Carla
Abstract :
Often, we worry about outsiders attacking our systems and networks, breaking through the perimeter defenses we\´ve established to keep bad actors out. However, we must also worry about "insider threats": people with legitimate access who behave in ways that put our data, systems, organizations, and even our businesses\´ viability at risk.
Keywords :
business data processing; organisational aspects; security of data; businesses viability; computer security; insider threats; Access control; Computer crime; Computer security; Costs; Data security; Law; Medical treatment; Monitoring; Personnel; World Wide Web; cyber crime; cyber security; insider threat; secure systems;