Insider Threats

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
(Employees)
Line 6: Line 6:
== Sources of Insider Threats ==
== Sources of Insider Threats ==
===Employees===
===Employees===
-
Employees of an organization are amongst the greatest risk in terms of access to and potential harm with an organization’s sensitive material. Organizations typically assume that they can trust their employees. They believe that their employees are primarily interested in the productivity and successfulness of the organization. Therefore they are not considered to be of any possible danger and are considered last when a a leak of sensitive material has occurred. ===Contractors===
+
Employees of an organization are amongst the greatest risk in terms of access to and potential harm with an organization’s sensitive material. Organizations typically assume that they can trust their employees. They believe that their employees are primarily interested in the productivity and successfulness of the organization. Therefore they are not considered to be of any possible danger and are considered last when a a leak of sensitive material has occurred.  
 +
 
 +
===Contractors===
Info
Info
 +
===Former Employees===
===Former Employees===
Info
Info

Revision as of 08:23, 23 March 2008

Definition

Contents

Overview of Insider Threats

Etc

Sources of Insider Threats

Employees

Employees of an organization are amongst the greatest risk in terms of access to and potential harm with an organization’s sensitive material. Organizations typically assume that they can trust their employees. They believe that their employees are primarily interested in the productivity and successfulness of the organization. Therefore they are not considered to be of any possible danger and are considered last when a a leak of sensitive material has occurred.

Contractors

Info

Former Employees

Info

Test

Preventing Insider Threats

  • Background checks
  • Monitoring employee behaviour
  • Restrict accounts
  • Restrict the scope of remote access
  • Enforce the principle of least privlege
Personal tools