Refining Insider Threat Profiles

Kirkpatrick, Shelley A.
September 2008
Security: Solutions for Enterprise Security Leaders;Sep2008, Vol. 45 Issue 9, p56
Trade Publication
The article discusses the significance of insiders in information system security of a company. The insiders are defined as individuals who have legitimate access to the physical and computer system of a company. They are a clear threat to information systems, proprietary information and company property. They may be current employees, contractors and vendors and may include individuals who previously had legitimate access.


Related Articles

  • THE COMMON CRITERIA AND INFORMATION SYSTEMS SECURITY CERTIFICATION. Kokkinos, Nikolaos C.; Maditinos, Dimitrios I.; Šević, Željko; Stojanovic, Aleksandar // Journal of Business Management;2012, Issue 5, p161 

    Information security is a vital business requirement in today's information systems (IS). Last decades, the prospect of information technology security evaluation became a great worldwide challenge for many national institutes, agencies and schemes. Eventually, on the road to international...

  • Don't reinvent the wheel. Small, Mike // SC Magazine: For IT Security Professionals (UK Edition);Jun2004, Special section p6 

    This article outlines the benefits of following a recognized standard to achieve both security and compliance, in relation to computer security. Allegedly, record-keeping is becoming an ever more complex task in business. On the one hand, new regulations govern the way data is recorded and...

  • Information security helps companies stay in business. Durand, Augusto // Caribbean Business;3/30/2006, Vol. 34 Issue 12, pS23 

    The article discusses the importance of information security to the growth of business enterprises in Puerto Rico. With the growing incidence of personal identity and credit card theft, it is paramount to maintain corporate security and network integrity. Corporate information officers,...

  • Study Finds Security Threats Growing on Mobile Technology.  // Certification Magazine;Oct2008, Vol. 10 Issue 10, p6 

    The article reports on the result of a survey titled "Trends in Information Security: A CompTIA Analysis of IT Security and the Workforce," conducted by the Computing Technology Industry Association (CompTIA). It reveals that in 2007, security threats in handheld and mobile devices have...

  • Best possible information. Bryan, Eugene L. // Executive Excellence;Sep98, Vol. 15 Issue 9, p5 

    Emphasizes the needs of business enterprises to work deliberately to be the best they can be. Necessity of best information for the success of business enterprises; Distinction on the difference of data, information and knowledge.

  • Leading knowledge-based businesses. Nair, Keshavan // Executive Excellence;Sep98, Vol. 15 Issue 9, p6 

    Emphasizes the necessity of knowledge and information to the success and competitive advantage of a business enterprise. How to select company leaders who have skills to succeed in knowledge-based businesses; Leadership requirements in knowledge-based businesses.

  • Faster learning. Guns, Bob // Executive Excellence;Sep98, Vol. 15 Issue 9, p7 

    Discusses transformational learning in knowledge-based business enterprises. Importance of learning faster to gain competitive advantage; Strategies that can be implemented for a fast learning organizations; Tips on transformational learning.

  • Working with knowledge. Davenport, Tom; Prusak, Larry // Executive Excellence;Sep98, Vol. 15 Issue 9, p10 

    Discusses the need of executives to understand the dynamics of internal knowledge markets in organizations. How should executives manage knowledge in an organization; Details on information management.

  • It's all a blur. Davis, Stan; Meyer, Christopher // Executive Excellence;Sep98, Vol. 15 Issue 9, p11 

    Discusses the trends in the knowledge-based economy. Necessity for business enterprises to know how to manage knowledge and information; How to build the knowledge-based business.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics