Loughborough University
Browse

File(s) under permanent embargo

Reason: This item is currently closed access.

Insider threats in information security categories and approaches

conference contribution
posted on 2016-06-06, 10:17 authored by Nebrase Elmrabit, Shuang-Hua Yang, Lili Yang
© 2015 Chinese Automation and Computing Society in the UK - CACS. The main concern of most security experts in the last years is the need to mitigate insider threats. However, leaking and selling data these days is easier than before; with the use of the invisible web, insiders can leak confidential data while remaining anonymous. In this paper, we give an overview of the various basic characteristics of insider threats. We also consider current approaches and controls to mitigating the level of such threats by broadly classifying them into two categories.

History

School

  • Business and Economics

Department

  • Business

Published in

2015 21st International Conference on Automation and Computing: Automation, Computing and Manufacturing for New Economic Growth, ICAC 2015

Citation

ELMRABIT, N., YANG, S-H. and YANG, L., 2015. Insider threats in information security categories and approaches. Presented at the 2015 21st International Conference on Automation and Computing: Automation, Computing and Manufacturing for New Economic Growth, (ICAC), Glasgow, 11-12th Sept, pp. 1-6.

Publisher

© IEEE

Version

  • VoR (Version of Record)

Publisher statement

This work is made available according to the conditions of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) licence. Full details of this licence are available at: https://creativecommons.org/licenses/by-nc-nd/4.0/

Publication date

2015

Notes

This paper is in closed access.

ISBN

9780992680107

Language

  • en