Insider Threats
From Computing and Software Wiki
(Difference between revisions)
												
			
		| Line 11: | Line 11: | ||
===Former Employees===  | ===Former Employees===  | ||
Info  | Info  | ||
| + | |||
| + | ==Preventing Insider Threats==  | ||
| + | *Background checks  | ||
| + | *Monitoring employee behaviour  | ||
| + | *Restrict accounts  | ||
| + | *Restrict the scope of remote access  | ||
| + | *Enforce the principle of least privlege  | ||
Revision as of 08:11, 23 March 2008
Definition
Contents | 
Overview of Insider Threats
Etc
Sources of Insider Threats
Employees
Info
Contractors
Info
Former Employees
Info
Preventing Insider Threats
- Background checks
 - Monitoring employee behaviour
 - Restrict accounts
 - Restrict the scope of remote access
 - Enforce the principle of least privlege
 
