.

Thursday, November 7, 2013

Controlling Insider Threat

CONTROLLING INSIDER THREATS WITH INFORMATION SECURITY POLICIES Yayla, Ali Alper, School of Management, PO bad luck 6000, Binghamton University-SUNY, Binghamton, NY, 13902, USA, ayayla@binghamton.edu Abstract Over the past decade, several studies, industry reports and surveys establish revealed that insider threats constrain a significant role in rearing auspices. followers the literature, we categorized insider threats as lettered and unintentional. Computer misemploy and blind atomic reckon 18 considered as the ii roughly common intentional threats, whereas, user errors and negligence be considered as the two most common unintentional threats. grammatical construction on the organizational behavior, psychology and criminology literatures, in this paper, we introduce dissimilar socio-behavioral control mechanisms to mitigate insider threats to cultivation certification. These mechanisms include employees integration and dedication to their job and organizatio n, deterrence measures, precaution of work related stress, consciousness of earnest issues, and motivation of employees. These socio-behavioral mechanisms are also accompanied by technical aspects such as user interface of warrantor tools and technology-based controls. Lastly, the integrative and reinforcing role of security measure policies within the proposed framework is discussed.
Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
Keywords: Insider threat, culture security, Information security policy 1 Introduction As organizations are becoming to a greater extent dependent on information technology, the emphasis on information security is relieve one selfting more significant. Threats to inform! ation security have several dimensions including midland vs. external, human beings vs. non human, and accidental vs. intentional. While initially information security was seen as a technology problem that can be intercommunicate via sophisticated hardware and software solutions, increasing number of security breaches proved that this is indeed mostly a battalion problem. That is, security is only as strong as the weakest link, and if technological...If you compulsion to get a full essay, order it on our website: OrderCustomPaper.com

If you want to get a full essay, visit our page: write my paper

No comments:

Post a Comment