Sökning: "Insider Threats"

Visar resultat 6 - 10 av 11 uppsatser innehållade orden Insider Threats.

  1. 6. Anomaly Detection in a SQL database: A Retrospective Investigation

    Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Vahid Naserinia; Mikael Beremark; [2022]
    Nyckelord :Anomaly Detection; Machine Learning; Data Mining; Database Security; Intrusion Detection.;

    Sammanfattning : Insider attacks aiming at stealing data are highly common, according to recent studies, and they are carried out in precise patterns. In order to protect against these threats, additional security measures, such as access control and encryption, must be used in conjunction with tools and methods that can detect anomalies in data access. LÄS MER

  2. 7. Masquerader Detection via 2fa Honeytokens

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Anton Wiklund; [2021]
    Nyckelord :Cyber security deception; two-factor authentication 2fa ; honeytoken; misinformation; intrusion detection;

    Sammanfattning : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. LÄS MER

  3. 8. Intrapreneurs as insider threats : A Rogerian literature review

    Kandidat-uppsats, Lunds universitet/Statsvetenskapliga institutionen

    Författare :Gustav Gatu; [2021]
    Nyckelord :Intrapreneurship; insider threats; employee deviance; intelligence services; innovation; Law and Political Science;

    Sammanfattning : This thesis explores how intrapreneurs can be recognized as insider threats. Nine different perspectives are presented, including deviant intrapreneurs, threatened and threatening resources, and subcultures on the tactical/operative level. Intrapreneurs are employees who use their entrepreneurial spirit for the benefit of their organizations. LÄS MER

  4. 9. IT-säkerhet : Användarbeteenden, orsaker och åtgärder

    Kandidat-uppsats,

    Författare :Sanna Andersson; Ellinor Schiöld; [2021]
    Nyckelord :IT-security; information security; insider threats; human factors; user behavior; causes; actions; IT-säkerhet; informationssäkerhet; insiderhot; mänskliga faktorer; användarbeteende; orsaker; åtgärder;

    Sammanfattning : Organisationer står idag inför flera olika hot mot deras IT-säkerhet där ett av de vanligaste hoten är skadliga användarbeteenden som främst orsakas av interna användare. Det kan vara svårt att veta för organisationer vad för användarbeteenden som kan utgöra ett hot samt vilka orsaker som kan bidrar till dessa beteenden. LÄS MER

  5. 10. Insider Threat detection using Isolation Forest

    Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknik

    Författare :Maja Scherman; Joakim Bülow; [2018]
    Nyckelord :MSc; Insider Threats; Isolation Forest; Machine Learning; Security; Technology and Engineering;

    Sammanfattning : In contrast to the need for companies to get real time information about insider threats, there is a privacy and integrity based limitation of what the individual accepts as acceptable surveillance. This creates a problem since performing online surveillance would pose an infringement on the employees privacy and integrity. LÄS MER