Insider Threats
From Computing and Software Wiki
(Difference between revisions)
| Line 11: | Line 11: | ||
===Former Employees=== | ===Former Employees=== | ||
Info | Info | ||
| + | |||
| + | ==Preventing Insider Threats== | ||
| + | *Background checks | ||
| + | *Monitoring employee behaviour | ||
| + | *Restrict accounts | ||
| + | *Restrict the scope of remote access | ||
| + | *Enforce the principle of least privlege | ||
Revision as of 08:11, 23 March 2008
Definition
Contents |
Overview of Insider Threats
Etc
Sources of Insider Threats
Employees
Info
Contractors
Info
Former Employees
Info
Preventing Insider Threats
- Background checks
- Monitoring employee behaviour
- Restrict accounts
- Restrict the scope of remote access
- Enforce the principle of least privlege
