Serdiouk, 2007 - Google Patents
Technologies for protection against insider attacks on computer systemsSerdiouk, 2007
- Document ID
- 15461290019662769765
- Author
- Serdiouk V
- Publication year
- Publication venue
- International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security
External Links
Snippet
During last decade the number of successful intruder attacks has increased in many times. The damage caused by these attacks is estimated in hundreds millions of dollars. Insiders have a significant advantage over others who might want to harm an organization. Insiders …
- 238000001514 detection method 0 abstract description 12
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Elifoglu et al. | Minimizing insider threat risk with behavioral monitoring | |
| EP1977364B1 (en) | Securing data in a networked environment | |
| JP4667361B2 (en) | Adaptive transparent encryption | |
| WO2008104965A2 (en) | A system and method for automatic data protection in a computer network | |
| Bann et al. | Trusted security policies for tackling advanced persistent threat via spear phishing in BYOD environment | |
| Al-Mhiqani et al. | A new taxonomy of insider threats: an initial step in understanding authorised attack | |
| Miloslavskaya et al. | Taxonomy for unsecure big data processing in security operations centers | |
| Prabhu et al. | A unified classification model of insider threats to information security | |
| Masood et al. | A Taxonomy of Insider Threat in isolated (air-gapped) Computer Networks | |
| Senapati et al. | Impact of information leakage and conserving digital privacy | |
| Wu et al. | Enterprise Information Security Management Based on Context‐Aware RBAC and Communication Monitoring Technology | |
| Paracha et al. | Implementation of two layered DLP strategies | |
| Žgela et al. | Security information and event management–capabilities, challenges and event analysis in the complex IT system | |
| Brindha et al. | An analysis of data leakage and prevention techniques in cloud environment | |
| Flynn et al. | Cloud service provider methods for managing insider threats: Analysis phase 2, expanded analysis and recommendations | |
| Serdiouk | Technologies for protection against insider attacks on computer systems | |
| Pawlik | Cybersecurity guidelines for the employees of the railway entities | |
| Kadu et al. | Review on securing data by using data leakage prevention and detection | |
| Georgiou et al. | A security policy for cloud providers | |
| Gottipati | Information security considerations for cloud-based Enterprise Resource Planning system and best practices for its retirement phase | |
| Franklin et al. | Mobile Device Security | |
| Trzeciak et al. | Model-Driven Insider Threat Control Selection and Deployment | |
| Bhilare et al. | Protecting intellectual property and sensitive information in academic campuses from trusted insiders: leveraging active directory | |
| Jousselin | Nonprofits Cybersecurity Plan | |
| Singh | Network security and management |