TITLE

Refining Insider Threat Profiles

AUTHOR(S)
Kirkpatrick, Shelley A.
PUB. DATE
September 2008
SOURCE
Security: Solutions for Enterprise Security Leaders;Sep2008, Vol. 45 Issue 9, p56
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the significance of insiders in information system security of a company. The insiders are defined as individuals who have legitimate access to the physical and computer system of a company. They are a clear threat to information systems, proprietary information and company property. They may be current employees, contractors and vendors and may include individuals who previously had legitimate access.
ACCESSION #
34723344

 

Related Articles

  • THE COMMON CRITERIA AND INFORMATION SYSTEMS SECURITY CERTIFICATION. Kokkinos, Nikolaos C.; Maditinos, Dimitrios I.; Šević, Željko; Stojanovic, Aleksandar // Journal of Business Management;2012, Issue 5, p161 

    Information security is a vital business requirement in today's information systems (IS). Last decades, the prospect of information technology security evaluation became a great worldwide challenge for many national institutes, agencies and schemes. Eventually, on the road to international...

  • Don't reinvent the wheel. Small, Mike // SC Magazine: For IT Security Professionals (UK Edition);Jun2004, Special section p6 

    This article outlines the benefits of following a recognized standard to achieve both security and compliance, in relation to computer security. Allegedly, record-keeping is becoming an ever more complex task in business. On the one hand, new regulations govern the way data is recorded and...

  • Information security helps companies stay in business. Durand, Augusto // Caribbean Business;3/30/2006, Vol. 34 Issue 12, pS23 

    The article discusses the importance of information security to the growth of business enterprises in Puerto Rico. With the growing incidence of personal identity and credit card theft, it is paramount to maintain corporate security and network integrity. Corporate information officers,...

  • Study Finds Security Threats Growing on Mobile Technology.  // Certification Magazine;Oct2008, Vol. 10 Issue 10, p6 

    The article reports on the result of a survey titled "Trends in Information Security: A CompTIA Analysis of IT Security and the Workforce," conducted by the Computing Technology Industry Association (CompTIA). It reveals that in 2007, security threats in handheld and mobile devices have...

  • Leading knowledge-based businesses. Nair, Keshavan // Executive Excellence;Sep98, Vol. 15 Issue 9, p6 

    Emphasizes the necessity of knowledge and information to the success and competitive advantage of a business enterprise. How to select company leaders who have skills to succeed in knowledge-based businesses; Leadership requirements in knowledge-based businesses.

  • Working with knowledge. Davenport, Tom; Prusak, Larry // Executive Excellence;Sep98, Vol. 15 Issue 9, p10 

    Discusses the need of executives to understand the dynamics of internal knowledge markets in organizations. How should executives manage knowledge in an organization; Details on information management.

  • Value creation. Mellander // Executive Excellence;Dec99, Vol. 16 Issue 12, p14 

    Focuses on the need for user-friendly finance information to be integrated with the management philosophy. Increase in the number of companies redesigning their financial information systems; Goal of bridging the gap between the official annual report and the investors' need for a full picture...

  • Reengineering, outsourcing and all that. Garrett, J. Gordon // Business Quarterly;Spring94, Vol. 58 Issue 3, The Information... p116 

    Discusses reengineering, or the redesign of business processes to achieve improvements in critical measurements of performance. Productivity paradox; Trends of moving from inflation to deflation and the coming of the global marketplace; Need for new information systems; Challenges of...

  • Learning from adopters' experiences with ERP: problems encountered and success achieved. Markus, M. Lynne; Axline, Sheryl; Petrie, David; Tanis, Sheryl Cornelis // Journal of Information Technology (Routledge, Ltd.);Dec2000, Vol. 15 Issue 4, p245 

    Enterprise resource planning (ERP) packages touch many aspects of a company's internal and external operations. Consequently, successful deployment and use of ERP systems are critical to organizational perfor6 mance and survival. This paper presents the results of a study of the problems and...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics