[go: up one dir, main page]

Serdiouk, 2007 - Google Patents

Technologies for protection against insider attacks on computer systems

Serdiouk, 2007

Document ID
15461290019662769765
Author
Serdiouk V
Publication year
Publication venue
International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security

External Links

Snippet

During last decade the number of successful intruder attacks has increased in many times. The damage caused by these attacks is estimated in hundreds millions of dollars. Insiders have a significant advantage over others who might want to harm an organization. Insiders …
Continue reading at link.springer.com (other versions)

Similar Documents

Publication Publication Date Title
Elifoglu et al. Minimizing insider threat risk with behavioral monitoring
EP1977364B1 (en) Securing data in a networked environment
JP4667361B2 (en) Adaptive transparent encryption
WO2008104965A2 (en) A system and method for automatic data protection in a computer network
Bann et al. Trusted security policies for tackling advanced persistent threat via spear phishing in BYOD environment
Al-Mhiqani et al. A new taxonomy of insider threats: an initial step in understanding authorised attack
Miloslavskaya et al. Taxonomy for unsecure big data processing in security operations centers
Prabhu et al. A unified classification model of insider threats to information security
Masood et al. A Taxonomy of Insider Threat in isolated (air-gapped) Computer Networks
Senapati et al. Impact of information leakage and conserving digital privacy
Wu et al. Enterprise Information Security Management Based on Context‐Aware RBAC and Communication Monitoring Technology
Paracha et al. Implementation of two layered DLP strategies
Žgela et al. Security information and event management–capabilities, challenges and event analysis in the complex IT system
Brindha et al. An analysis of data leakage and prevention techniques in cloud environment
Flynn et al. Cloud service provider methods for managing insider threats: Analysis phase 2, expanded analysis and recommendations
Serdiouk Technologies for protection against insider attacks on computer systems
Pawlik Cybersecurity guidelines for the employees of the railway entities
Kadu et al. Review on securing data by using data leakage prevention and detection
Georgiou et al. A security policy for cloud providers
Gottipati Information security considerations for cloud-based Enterprise Resource Planning system and best practices for its retirement phase
Franklin et al. Mobile Device Security
Trzeciak et al. Model-Driven Insider Threat Control Selection and Deployment
Bhilare et al. Protecting intellectual property and sensitive information in academic campuses from trusted insiders: leveraging active directory
Jousselin Nonprofits Cybersecurity Plan
Singh Network security and management