Abstract: Threat from the insider of corporates is a serious problem since it is very challenging to recognize them from a benign activity. In this paper, we discuss and describing various types of insider threats. Next, we discuss the related work on insider threat mitigation in both technical and non-technical approaches. It is found that tackling insider threat requires both technical, and non-technical approaches to enable qualified detection of threats and seems to lose importance an IT infrastructure is used in performing insider attacks.
Keywords: Insider threat, Cyber security, Insider threat Mitigation.
Title: Protocols and Standards of Insider Threat: Issues and challenges
Author: Latifa Hussaini, Jamaludin Ibrahim
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals