[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Woodruff Sr, 2020 - Google Patents

Practical Cybersecurity Controls for Countering the Insider Threat: A Qualitative Delphi Study

Woodruff Sr, 2020

Document ID
17448075725889561555
Author
Woodruff Sr S
Publication year

External Links

Snippet

This qualitative Delphi study examined the perspectives of cybersecurity and information technology experts to build consensus and develop a proactive model for defending the corporate infrastructure from the insider threat and protecting intellectual property and …
Continue reading at search.proquest.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Similar Documents

Publication Publication Date Title
Saxena et al. Impact and key challenges of insider threats on organizations and critical businesses
Grama Legal and Privacy Issues in Information Security
Offner et al. Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation
Greitzer et al. Combining traditional cyber security audit data with psychosocial data: towards predictive modeling for insider threat mitigation
Band et al. Comparing insider IT sabotage and espionage: A model-based analysis
Theis et al. Common sense guide to mitigating insider threats
Pomerleau et al. Countering Cyber Threats to Financial Institutions
Burkhead A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management
Williams-Banta Security technology and awareness training; do they affect behaviors and thus reduce breaches?
Kessler Effectiveness of the protection motivation theory on small business employee security risk behavior
Priyadarshini et al. Cybersecurity: Ethics, legal, risks, and policies
Watters Cybercrime and Cybersecurity
Woodruff Sr Practical Cybersecurity Controls for Countering the Insider Threat: A Qualitative Delphi Study
McLaurin A study on the efficacy of small business cybersecurity controls
Al Zaidy Impact of training on employee actions and information security awareness in academic institutions
Mills The current state of insider threat awareness and readiness in corporate cyber security-an analysis of definitions, prevention, detection and mitigation
Waters Identifying and preventing insider threats
Bhattacharya Leadership styles and information security in small businesses: An empirical investigation
Dorrington Future insider threats: A Delphi analysis
Loukaka Advanced Methods to Detect Intricate Cybersecurity Exploits: An Exploratory Qualitative Inquiry
Yeo Unintentional insider threat assessment framework: Examining the human security indicators in healthcare cybersecurity
Nur Cybersecurity awareness in Somalia
Elmrabit A multiple-perspective approach for insider-threat risk prediction in cyber-security.
Trilho Intelligent Systems for Cyber Defence-An Architecture Framework for Cyber Defence Using Artificial Intelligence
Castleberry et al. Attack Scenarios Relating to Army Facility-Related Control Systems: Quantifying the Cost to Secure and Cost Savings of the Army’s FRCS Program