dc.creator | Tsiostas D., Kittes G., Chouliaras N., Kantzavelou I., Maglaras L., Douligeris C., Vlachos V. | en |
dc.date.accessioned | 2023-01-31T10:15:14Z | |
dc.date.available | 2023-01-31T10:15:14Z | |
dc.date.issued | 2020 | |
dc.identifier | 10.1145/3437120.3437336 | |
dc.identifier.isbn | 9781450388979 | |
dc.identifier.uri | http://hdl.handle.net/11615/80004 | |
dc.description.abstract | The insider threat is increasingly becoming extremely important for companies, organizations and even governments. A malicious, or even a careless, insider can cause severe damage to the resources and the reputation of an organization. In this article, we provide an overview of the basic characteristics of insider cyber-security threats and we present current approaches and controls of mitigating such threats. © 2020 ACM. | en |
dc.language.iso | en | en |
dc.source | ACM International Conference Proceeding Series | en |
dc.source.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85102378027&doi=10.1145%2f3437120.3437336&partnerID=40&md5=2333e256a44a82f47f101aab77199795 | |
dc.subject | Computer applications | en |
dc.subject | Computer programming | en |
dc.subject | Basic characteristics | en |
dc.subject | Cyber security | en |
dc.subject | Insider Threat | en |
dc.subject | Mitigation techniques | en |
dc.subject | Security of data | en |
dc.subject | Association for Computing Machinery | en |
dc.title | The Insider Threat: Reasons, Effects and Mitigation Techniques | en |
dc.type | conferenceItem | en |