Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider
A range of international regulatory documents state the importance of counteracting insiders, especially cyber-insiders, in critical facilities and simultaneously providing complex protection, which includes technical, administrative and information protection. In that case the insider, who is fami...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
ITB Journal Publisher
2015-07-01
|
Series: | Journal of ICT Research and Applications |
Online Access: | http://journals.itb.ac.id/index.php/jictra/article/view/576 |