Font Size: a A A

A Study Of Inside Threat To Information Systems

Posted on:2005-06-24Degree:MasterType:Thesis
Country:ChinaCandidate:R H ChenFull Text:PDF
GTID:2168360152955546Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
The threats to information system come from both inside and outside. For a long time, the inside threat is the weak point of security research, limiting to concept level and lacking complete technology to prevent and detect, while we already have many products dealing with outside threats.Firstly, we analyze the present research work on inside threats and give the definition for inside attack and inside threat. Through the analysis of some cases , we illustrate the huge damages of inside threats and analyze the causes of inside threat. Based on this analysis and the theories and method for entreating outside threat's , the theory and model for entreating inside threats. Finally, we discuss the RAND conference's suggestions about inside threats and the near-term solution method.
Keywords/Search Tags:Insider threat, model, solution method
PDF Full Text Request
Related items