.

Saturday, October 12, 2013

Controlling Insider Threat

CONTROLLING INSIDER THREATS WITH INFORMATION SECURITY POLICIES Yayla, Ali Alper, School of Management, PO possibility 6000, Binghamton University-SUNY, Binghamton, NY, 13902, USA, ayayla@binghamton.edu Abstract Over the past decade, several studies, industry reports and surveys nominate revealed that insider threats constrain a significant role in upbringing auspices. followers the literature, we categorized insider threats as lettered and unintentional. Computer profane and blind atomic reckon 18 considered as the ii roughly common intentional threats, whereas, user errors and negligence argon considered as the two most common unintentional threats. edifice on the organizational behavior, psychology and criminology literatures, in this paper, we introduce contrastive socio-behavioral control mechanisms to mitigate insider threats to culture certification. These mechanisms include employees integration and dedication to their job and organization, deterrence m easures, precaution of work related stress, knowingness of guarantor system issues, and motivation of employees. These socio-behavioral mechanisms are also accompanied by technical aspects such as user interface of auspices tools and technology-based controls. Lastly, the integrative and reinforcing role of security policies within the proposed framework is discussed.
Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
Keywords: Insider threat, nurture security, Information security policy 1 Introduction As organizations are becoming to a greater extent dependent on information technology, the emphasis on information security is arouseting more significant. Threats to information security have several! dimensions including midland vs. external, gentlemans gentleman vs. non human, and accidental vs. intentional. While initially information security was seen as a technology problem that can be turn to via sophisticated hardware and software solutions, increasing number of security breaches proved that this is indeed mostly a battalion problem. That is, security is only as strong as the weakest link, and if technological...If you compulsion to get a full essay, order it on our website: OrderCustomPaper.com

If you want to get a full essay, visit our page: write my paper

No comments:

Post a Comment