Thursday, April 09, 2009

Insider threats

What is insider threat to information security in organizations?

Why do we need to monitoring threats which may originate from the authorized or trusted user (insider) of a system?

How do we monitor this insider threats (what is/are the existing approaches to monitoring insider threats?)

No comments: