The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Insider-Threat Detection in Corporate Espionage and Cyber-Espionage
Abstract
National Security will always be threatened by individuals internal to the organization in the form of an insider-threat and external to the organization in the form of corporate espionage or cyber-espionage. Therefore, insider-threat detection methods, security precautions, authentication processes, and standard operating procedures for employees should be in place to try to reduce the instances of an insider-threat and/or an external threat breaching the security of an organization, institution, company, or governmental agency. Espionage and cyber-espionage can and does occur; however, it is not usually made public knowledge and when it does, it can have grave effects on the organization, institution, company, or governmental agency in which it occurred. Within this chapter the author explores how an insider-threat in the form of a Data Scientist, Penetration Tester, or Data Analyst can use their education, access, and background to gain access to systems and information that can be of value to external organizations, institutions, companies, and/or governmental agencies.
Related Content
Siva Raja Sindiramutty, Noor Zaman Jhanjhi, Chong Eng Tan, Navid Ali Khan, Bhavin Shah, Amaranadha Reddy Manchuri.
© 2024.
58 pages.
|
Imdad Ali Shah, Raja Kumar Murugesan, Samina Rajper.
© 2024.
31 pages.
|
Rana Muhammad Amir Latif, Muhammad Farhan, Navid Ali Khan, R. Sujatha.
© 2024.
33 pages.
|
Imdad Ali Shah, Areesha Sial, Sarfraz Nawaz Brohi.
© 2024.
25 pages.
|
Kassim Kalinaki, Wasswa Shafik, Sarah Namuwaya, Sumaya Namuwaya.
© 2024.
24 pages.
|
Imdad Ali Shah, N. Z. Jhanjhi, Humaira Ashraf.
© 2024.
24 pages.
|
Rida Zehra.
© 2024.
18 pages.
|
|
|