Abstract

Any organization nowadays needs a secure network. High-speed wireless networks and internet services are becoming increasingly unsafe as a result of the daily rise in security threats. Threats to information security come from within the company, in close to 80% of cases. With the latest trend of mobility (portable devices such as laptops and smartphones etc.), ubiquitous 3G connectivity and this trend increases but as more web-based applications are manufactured and available over the Internet, the instances of insider threats have been rising at an alarming rate. Current or former workers, contractors, or business partners who have permission to access the organization's network and servers are typically the source of insider threats. Confidential information is frequently stolen for monetary gain or wellful harm. Access to hacking tools via the Internet, USB drives, and wireless connectivity make break-ins simple. Here, Millions of dollars in losses in the event of IP theft, and customer / individual information theft are yet too considered. This article provides insight into Insider dangers, attackers, and their rationales and recommendations for organizational-level mitigation methods.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call