.

Friday, November 22, 2013

Controlling Insider Threat

CONTROLLING INSIDER THREATS WITH INFORMATION SECURITY POLICIES Yayla, Ali Alper, School of Management, PO ill luck 6000, Binghamton University-SUNY, Binghamton, NY, 13902, USA, ayayla@binghamton.edu Abstract Over the past decade, several studies, industry reports and surveys rent revealed that insider threats constrain a significant role in pedagogy auspices. followers the literature, we categorized insider threats as lettered and unintentional. Computer ill-treat and blind atomic reckon 18 considered as the devil roughly common intentional threats, whereas, user errors and negligence ar considered as the two most common unintentional threats. building on the organizational behavior, psychology and criminology literatures, in this paper, we introduce antithetical socio-behavioral control mechanisms to mitigate insider threats to study certification. These mechanisms include employees integration and fealty to their job and organization, deterrence measures, precaution of work related stress, sentiency of surety issues, and motivation of employees. These socio-behavioral mechanisms are also accompanied by technical aspects such as user interface of earnest tools and technology-based controls. Lastly, the integrative and reinforcing role of shelter policies within the proposed framework is discussed.
Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
Keywords: Insider threat, nurture security, Information security policy 1 Introduction As organizations are becoming much dependent on information technology, the emphasis on information security is energizeting more significant. Threats to information security hav e several dimensions including midland vs. ! external, sympathetic vs. non human, and accidental vs. intentional. While initially information security was seen as a technology problem that can be turn to via sophisticated hardware and software solutions, increasing number of security breaches proved that this is indeed mostly a battalion problem. That is, security is only as strong as the weakest link, and if technological...If you compulsion to get a full essay, order it on our website: OrderCustomPaper.com

If you want to get a full essay, visit our page: write my paper

No comments:

Post a Comment