Εμφάνιση απλής εγγραφής

dc.creatorTsiostas D., Kittes G., Chouliaras N., Kantzavelou I., Maglaras L., Douligeris C., Vlachos V.en
dc.date.accessioned2023-01-31T10:15:14Z
dc.date.available2023-01-31T10:15:14Z
dc.date.issued2020
dc.identifier10.1145/3437120.3437336
dc.identifier.isbn9781450388979
dc.identifier.urihttp://hdl.handle.net/11615/80004
dc.description.abstractThe insider threat is increasingly becoming extremely important for companies, organizations and even governments. A malicious, or even a careless, insider can cause severe damage to the resources and the reputation of an organization. In this article, we provide an overview of the basic characteristics of insider cyber-security threats and we present current approaches and controls of mitigating such threats. © 2020 ACM.en
dc.language.isoenen
dc.sourceACM International Conference Proceeding Seriesen
dc.source.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85102378027&doi=10.1145%2f3437120.3437336&partnerID=40&md5=2333e256a44a82f47f101aab77199795
dc.subjectComputer applicationsen
dc.subjectComputer programmingen
dc.subjectBasic characteristicsen
dc.subjectCyber securityen
dc.subjectInsider Threaten
dc.subjectMitigation techniquesen
dc.subjectSecurity of dataen
dc.subjectAssociation for Computing Machineryen
dc.titleThe Insider Threat: Reasons, Effects and Mitigation Techniquesen
dc.typeconferenceItemen


Αρχεία σε αυτό το τεκμήριο

ΑρχείαΜέγεθοςΤύποςΠροβολή

Δεν υπάρχουν αρχεία που να σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στις ακόλουθες συλλογές

Εμφάνιση απλής εγγραφής