New Frontiers of Network Security: The Threat Within
S. Sanyal, A. Shelat, and A. Gupta. (2010)cite arxiv:1010.1938
Comment: 4 Pages, Invited Paper in VCON'10: 2nd Vaagdevi International
Conference on Information Technology for Real World Problems Vaagdevi College
of Engineering, Warangal, Andhra Pradesh, India, December 9-11, 2010.
Abstract
Nearly 70% of information security threats originate from inside an
organization. Opportunities for insider threats have been increasing at an
alarming rate with the latest trends of mobility (portable devices like Laptop,
smart phones etc.), ubiquitous connectivity (wireless or through 3G
connectivity) and this trend increases as more and more web-based applications
are made available over the Internet. Insider threats are generally caused by
current or ex-employees, contractors or partners, who have authorized access to
the organization's network and servers. Theft of confidential information is
often for either material gain or for willful damage. Easy availability of
hacking tools on the Internet, USB devices and wireless connectivity provide
for easy break-ins. The net result is losses worth millions of dollars in terms
of IP theft, leakage of customer / individual information, etc. This paper
presents an understanding of Insider threats, attackers and their motives and
suggests mitigation techniques at the organization level
Description
[1010.1938] New Frontiers of Network Security: The Threat Within
cite arxiv:1010.1938
Comment: 4 Pages, Invited Paper in VCON'10: 2nd Vaagdevi International
Conference on Information Technology for Real World Problems Vaagdevi College
of Engineering, Warangal, Andhra Pradesh, India, December 9-11, 2010
%0 Generic
%1 Sanyal2010
%A Sanyal, Sugata
%A Shelat, Ajit
%A Gupta, Amit
%D 2010
%K electronic employee personalization privacy survey
%T New Frontiers of Network Security: The Threat Within
%U http://arxiv.org/abs/1010.1938
%X Nearly 70% of information security threats originate from inside an
organization. Opportunities for insider threats have been increasing at an
alarming rate with the latest trends of mobility (portable devices like Laptop,
smart phones etc.), ubiquitous connectivity (wireless or through 3G
connectivity) and this trend increases as more and more web-based applications
are made available over the Internet. Insider threats are generally caused by
current or ex-employees, contractors or partners, who have authorized access to
the organization's network and servers. Theft of confidential information is
often for either material gain or for willful damage. Easy availability of
hacking tools on the Internet, USB devices and wireless connectivity provide
for easy break-ins. The net result is losses worth millions of dollars in terms
of IP theft, leakage of customer / individual information, etc. This paper
presents an understanding of Insider threats, attackers and their motives and
suggests mitigation techniques at the organization level
@misc{Sanyal2010,
abstract = { Nearly 70% of information security threats originate from inside an
organization. Opportunities for insider threats have been increasing at an
alarming rate with the latest trends of mobility (portable devices like Laptop,
smart phones etc.), ubiquitous connectivity (wireless or through 3G
connectivity) and this trend increases as more and more web-based applications
are made available over the Internet. Insider threats are generally caused by
current or ex-employees, contractors or partners, who have authorized access to
the organization's network and servers. Theft of confidential information is
often for either material gain or for willful damage. Easy availability of
hacking tools on the Internet, USB devices and wireless connectivity provide
for easy break-ins. The net result is losses worth millions of dollars in terms
of IP theft, leakage of customer / individual information, etc. This paper
presents an understanding of Insider threats, attackers and their motives and
suggests mitigation techniques at the organization level
},
added-at = {2011-11-12T19:22:11.000+0100},
author = {Sanyal, Sugata and Shelat, Ajit and Gupta, Amit},
biburl = {https://www.bibsonomy.org/bibtex/2c53dd5c218a29a2791f3ac0484aefc2d/gizmoguy},
description = {[1010.1938] New Frontiers of Network Security: The Threat Within},
interhash = {339da9525c96cbaeb142b86d1a01b3e2},
intrahash = {c53dd5c218a29a2791f3ac0484aefc2d},
keywords = {electronic employee personalization privacy survey},
note = {cite arxiv:1010.1938
Comment: 4 Pages, Invited Paper in VCON'10: 2nd Vaagdevi International
Conference on Information Technology for Real World Problems Vaagdevi College
of Engineering, Warangal, Andhra Pradesh, India, December 9-11, 2010},
timestamp = {2011-11-12T19:22:11.000+0100},
title = {New Frontiers of Network Security: The Threat Within},
url = {http://arxiv.org/abs/1010.1938},
year = 2010
}