首页> 外文期刊>Database and network journal >Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
【24h】

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders

机译:保护敏感数据免受恶意内部人员攻击的十大指南

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

Insider threats, both careless and malicious, abound. Thisrnfact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased. It's no wonder that we're hearing about a growing number of attacks where the target is sensitive data, and the perpetrators are those with evaluated levels of trust and access: insiders. For years, organizations have worked diligently to lock down their perimeters only to find out that the most devastating enemy is already inside. Today, most organizations would agree that their most valuable IT assets reside within applications and databases.
机译:粗心和恶意的内部威胁无处不在。在困难的经济时期,这一事实被放大了。随着大量的数字化信息,以及用于将信用卡数据,个人身份信息和知识产权转化为现金,商品和其他服务的工具,风险增加了。难怪我们听到了越来越多的攻击,其中目标是敏感数据,而攻击者是经过评估的信任和访问级别的人员:内部人员。多年来,组织一直在努力锁定自己的边界,只是发现最破坏性的敌人已经在内部。今天,大多数组织都同意他们最有价值的IT资产位于应用程序和数据库中。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号