Mostra i principali dati dell'item

dc.creatorTsiostas D., Kittes G., Chouliaras N., Kantzavelou I., Maglaras L., Douligeris C., Vlachos V.en
dc.date.accessioned2023-01-31T10:15:14Z
dc.date.available2023-01-31T10:15:14Z
dc.date.issued2020
dc.identifier10.1145/3437120.3437336
dc.identifier.isbn9781450388979
dc.identifier.urihttp://hdl.handle.net/11615/80004
dc.description.abstractThe insider threat is increasingly becoming extremely important for companies, organizations and even governments. A malicious, or even a careless, insider can cause severe damage to the resources and the reputation of an organization. In this article, we provide an overview of the basic characteristics of insider cyber-security threats and we present current approaches and controls of mitigating such threats. © 2020 ACM.en
dc.language.isoenen
dc.sourceACM International Conference Proceeding Seriesen
dc.source.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85102378027&doi=10.1145%2f3437120.3437336&partnerID=40&md5=2333e256a44a82f47f101aab77199795
dc.subjectComputer applicationsen
dc.subjectComputer programmingen
dc.subjectBasic characteristicsen
dc.subjectCyber securityen
dc.subjectInsider Threaten
dc.subjectMitigation techniquesen
dc.subjectSecurity of dataen
dc.subjectAssociation for Computing Machineryen
dc.titleThe Insider Threat: Reasons, Effects and Mitigation Techniquesen
dc.typeconferenceItemen


Files in questo item

FilesDimensioneFormatoMostra

Nessun files in questo item.

Questo item appare nelle seguenti collezioni

Mostra i principali dati dell'item