Woodruff Sr, 2020 - Google Patents
Practical Cybersecurity Controls for Countering the Insider Threat: A Qualitative Delphi StudyWoodruff Sr, 2020
- Document ID
- 17448075725889561555
- Author
- Woodruff Sr S
- Publication year
External Links
Snippet
This qualitative Delphi study examined the perspectives of cybersecurity and information technology experts to build consensus and develop a proactive model for defending the corporate infrastructure from the insider threat and protecting intellectual property and …
- 238000000034 method 0 abstract description 152
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Saxena et al. | Impact and key challenges of insider threats on organizations and critical businesses | |
Grama | Legal and Privacy Issues in Information Security | |
Offner et al. | Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation | |
Greitzer et al. | Combining traditional cyber security audit data with psychosocial data: towards predictive modeling for insider threat mitigation | |
Band et al. | Comparing insider IT sabotage and espionage: A model-based analysis | |
Theis et al. | Common sense guide to mitigating insider threats | |
Pomerleau et al. | Countering Cyber Threats to Financial Institutions | |
Burkhead | A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management | |
Williams-Banta | Security technology and awareness training; do they affect behaviors and thus reduce breaches? | |
Kessler | Effectiveness of the protection motivation theory on small business employee security risk behavior | |
Priyadarshini et al. | Cybersecurity: Ethics, legal, risks, and policies | |
Watters | Cybercrime and Cybersecurity | |
Woodruff Sr | Practical Cybersecurity Controls for Countering the Insider Threat: A Qualitative Delphi Study | |
McLaurin | A study on the efficacy of small business cybersecurity controls | |
Al Zaidy | Impact of training on employee actions and information security awareness in academic institutions | |
Mills | The current state of insider threat awareness and readiness in corporate cyber security-an analysis of definitions, prevention, detection and mitigation | |
Waters | Identifying and preventing insider threats | |
Bhattacharya | Leadership styles and information security in small businesses: An empirical investigation | |
Dorrington | Future insider threats: A Delphi analysis | |
Loukaka | Advanced Methods to Detect Intricate Cybersecurity Exploits: An Exploratory Qualitative Inquiry | |
Yeo | Unintentional insider threat assessment framework: Examining the human security indicators in healthcare cybersecurity | |
Nur | Cybersecurity awareness in Somalia | |
Elmrabit | A multiple-perspective approach for insider-threat risk prediction in cyber-security. | |
Trilho | Intelligent Systems for Cyber Defence-An Architecture Framework for Cyber Defence Using Artificial Intelligence | |
Castleberry et al. | Attack Scenarios Relating to Army Facility-Related Control Systems: Quantifying the Cost to Secure and Cost Savings of the Army’s FRCS Program |