Insider Threats

Risk to Organization

Authors

  • Atul Rana HCL Technologies Ltd., India
  • Upasana Nigam HCL Technologies Ltd., India
  • Deepak Jain HCL Technologies Ltd., India

DOI:

https://doi.org/10.51611/iars.irj.v2i1.2012.18

Keywords:

Information Security, Data Security Threats, Information Security Risks

Abstract

Information security is an essential component and assets for any organization, whether it is commercial government or proprietary business. Report after report keeps pointing to the “insider threat†as one of the greatest information security risks within the modern organization. But what exactly is the insider threat and how we can help reduce this risk? This paper analyzes the importance of information security, benefits of it and how the information can be protected by the various threats which are inside the organization, and may leads to information loss. The aim of this paper is to allow businesses, administrators, developers and designers to produce and provide with some methods or techniques to secure such information so that the risk associated with the information loss can be minimized. In this paper we will break down the various attributes of the insider threat, and suggest some methods have been suggested which can help an organization to secure the sensitive and crucial information.

Downloads

Download data is not yet available.

References

Annual Report- PandaLabs 2011: DOI – http://pandalabs.pandasecurity.com
Cisco Public Information: DOI – https://www.cisco.com/go/offices
InfraGard Tampa Bay - The Sylint Group: DOI – http://infragardtampabay.org
Julio Cella, “Antivirus at SMTP Gateways Level”: DOI – http://www.sans.org/infosecFAQ/malicious/gateway.htm
SECURITY THREATS – GFI Software: DOI – http://www.gfi.com
Symantec Antivirus Research Center ”Security Updates”: DOI – http://www.symantec.com/avcenter/vinfodb.html

Crossref Crossmark

Downloads

Published

2012-02-08

Issue

Section

Peer Reviewed Research Manuscript

How to Cite

“Insider Threats: Risk to Organization” (2012) IARS’ International Research Journal, 2(1). doi:10.51611/iars.irj.v2i1.2012.18.

Citations

Similar Articles

1-10 of 63

You may also start an advanced similarity search for this article.