首页> 外文学位 >Confronting the insider threat.
【24h】

Confronting the insider threat.

机译:面对内部威胁。

获取原文
获取原文并翻译 | 示例

摘要

Insider attacks have historically been, and will continue to be, a threat to organizations of all types. This issue is important because it can affect almost any type of business. Unfortunately, organizations have generally focused more on preventing the external threats to their networks, and done little to recognize or deter attacks originating from within. With the proper training of the workforce and the implementation of effective countermeasure, the threat of insider attacks can be considerably reduced. The purpose of this research project was to draw attention to the problem of insider threat and highlight methods for reducing the risk of such attack. First, a definition of insider threat was established. Then, specific characteristics and motives of an insider threat in order to better identify and anticipate future occurrences of an insider threat were examined, in order to better anticipate or recognize future occurrences of an insider threat. This was followed by descriptions of possible indicators of an active insider attack and reasoning behind such actions. Next, practical countermeasures and procedures were detailed, to suggest possible ways businesses could deter or prevent an attack on their networks by an insider threat. Additionally, some actual cases of insider threat were examined, demonstrating some of the traits and indicators of those cases. Finally, key findings and specific recommendations are provided in the conclusion of this paper.;Keywords: Cybersecurity, Professor Albert Orbinati, Walker, Snowden, CERT, espionage, Intellectual Property theft.
机译:内部攻击在历史上一直并将继续是对所有类型组织的威胁。这个问题很重要,因为它可能会影响几乎所有类型的业务。不幸的是,组织通常将更多的精力放在防止对其网络的外部威胁上,并且几乎没有做任何事情来识别或阻止来自内部的攻击。通过对员工进行适当的培训并采取有效的对策,可以大大减少内部攻击的威胁。该研究项目的目的是引起人们对内部威胁的关注,并重点介绍降低此类攻击风险的方法。首先,建立了内部威胁的定义。然后,检查了内部威胁的特定特征和动机,以便更好地识别和预期内部威胁的未来发生,以便更好地预测或识别内部威胁的未来发生。其次,描述了积极的内部攻击的可能指标以及此类行为背后的原因。接下来,详细介绍了实用的对策和过程,以提出企业可以阻止或阻止内部威胁对网络进行攻击的可能方法。此外,还检查了一些内部威胁的实际案例,展示了这些案例的某些特征和指标。最后,本文的结论提供了主要发现和具体建议。关键字:网络安全,Albert Orbinati教授,Walker,Snowden,CERT,间谍活动,间谍活动,知识产权盗窃。

著录项

  • 作者

    Sperry, Jeffery M.;

  • 作者单位

    Utica College.;

  • 授予单位 Utica College.;
  • 学科 Information Technology.;Business Administration Management.;Political Science Public Administration.;Computer Science.
  • 学位 M.S.
  • 年度 2014
  • 页码 57 p.
  • 总页数 57
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号