Loughborough University
Leicestershire, UK
LE11 3TU
+44 (0)1509 263171
Loughborough University

Loughborough University Institutional Repository

Please use this identifier to cite or link to this item: https://dspace.lboro.ac.uk/2134/21482

Title: Insider threats in information security categories and approaches
Authors: Elmrabit, Nebrase
Yang, Shuang-Hua
Yang, Lili
Keywords: Insider threats
Data leaking
Privileged user abuse
Insider attacks
Insider predictions
Issue Date: 2015
Publisher: © IEEE
Citation: ELMRABIT, N., YANG, S-H. and YANG, L., 2015. Insider threats in information security categories and approaches. Presented at the 2015 21st International Conference on Automation and Computing: Automation, Computing and Manufacturing for New Economic Growth, (ICAC), Glasgow, 11-12th Sept, pp. 1-6.
Abstract: © 2015 Chinese Automation and Computing Society in the UK - CACS. The main concern of most security experts in the last years is the need to mitigate insider threats. However, leaking and selling data these days is easier than before; with the use of the invisible web, insiders can leak confidential data while remaining anonymous. In this paper, we give an overview of the various basic characteristics of insider threats. We also consider current approaches and controls to mitigating the level of such threats by broadly classifying them into two categories.
Description: This paper is in closed access.
Version: Published
DOI: 10.1109/IConAC.2015.7313979
URI: https://dspace.lboro.ac.uk/2134/21482
Publisher Link: http://dx.doi.org/10.1109/IConAC.2015.7313979
ISBN: 9780992680107
Appears in Collections:Closed Access (Business)
Closed Access (Computer Science)

Files associated with this item:

File Description SizeFormat
Insider Threats in Information Security Categories and approaches.pdfPublished version181.32 kBAdobe PDFView/Open


SFX Query

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.