Essays about: "insider threat"

Showing result 1 - 5 of 10 essays containing the words insider threat.

  1. 1. Comparing machine learning algorithms for detecting behavioural anomalies

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Fredrik Jansson; [2023]
    Keywords : Anomaly Detection; Machine Learning; Behavioural Anomalies;

    Abstract : Background. Attempted intrusions at companies, either from an insider threat orotherwise, is increasing in frequency. Most commonly used is static analysis and filters to stop specific attacks. READ MORE

  2. 2. To Spy the Lie. Detecting the Insider Threat of Espionage

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Emma Bergström; [2023]
    Keywords : Insider threat; insider risk; espionage; personality traits; theoretical model of risk factors; personality assessment;

    Abstract : Acts committed by insiders have risen during past years, and there is a need for a better understanding of how preventive measures can be used, not just remedial action after the fact. The current narrative in research when discussing espionage was motive; why someone committed espionage. READ MORE

  3. 3. Insider Threat For Service Account in Google Cloud Platform

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Ravikiran Talekar; [2023]
    Keywords : ;

    Abstract : As most software industry is migrating from traditional servers and depending more on Cloud-based services, we are encountering new problems hitherto unknown to us. Due to the variousadvantages offered by Cloud services and the numerous problems whose solutions are providedby Cloud technologies, cloud-based services have become very popular. READ MORE

  4. 4. Guidelines for white box penetration testing wired devices in secure network environments

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Daniel Le Vandolph; [2023]
    Keywords : Penetration test; security assessment; white box; secure network; framework; methodology; guidelines;

    Abstract : As technology is becoming a prevalent and ubiquitous part of society, increasing levels of cybercrime have drawn attention to the need for suitable frameworks for ensuring the security of systems by conducting penetration tests. There are several large and established frameworks for doing so, and they tend to focus on complicated large systems with multiple endpoints, devices, and network layers. READ MORE

  5. 5. The human connection to information security : A qualitative study on policy development, communication and compliance in government agencies

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Osama Abdulhadi; [2023]
    Keywords : Communication; compliance; development; effectiveness; government agencies; human factor; information security; information security awareness; information security culture; information security management system; information security policy; insider threat;

    Abstract : The human factor and insider threats play a crucial role in information security. In today’s digital age, protecting organizational data requires a deep understanding of human behaviour and its impact on information security. READ MORE