Sökning: "Insider Threats"
Visar resultat 6 - 10 av 11 uppsatser innehållade orden Insider Threats.
6. Anomaly Detection in a SQL database: A Retrospective Investigation
Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologiSammanfattning : Insider attacks aiming at stealing data are highly common, according to recent studies, and they are carried out in precise patterns. In order to protect against these threats, additional security measures, such as access control and encryption, must be used in conjunction with tools and methods that can detect anomalies in data access. LÄS MER
7. Masquerader Detection via 2fa Honeytokens
Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Sammanfattning : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. LÄS MER
8. Intrapreneurs as insider threats : A Rogerian literature review
Kandidat-uppsats, Lunds universitet/Statsvetenskapliga institutionenSammanfattning : This thesis explores how intrapreneurs can be recognized as insider threats. Nine different perspectives are presented, including deviant intrapreneurs, threatened and threatening resources, and subcultures on the tactical/operative level. Intrapreneurs are employees who use their entrepreneurial spirit for the benefit of their organizations. LÄS MER
9. IT-säkerhet : Användarbeteenden, orsaker och åtgärder
Kandidat-uppsats,Sammanfattning : Organisationer står idag inför flera olika hot mot deras IT-säkerhet där ett av de vanligaste hoten är skadliga användarbeteenden som främst orsakas av interna användare. Det kan vara svårt att veta för organisationer vad för användarbeteenden som kan utgöra ett hot samt vilka orsaker som kan bidrar till dessa beteenden. LÄS MER
10. Insider Threat detection using Isolation Forest
Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknikSammanfattning : In contrast to the need for companies to get real time information about insider threats, there is a privacy and integrity based limitation of what the individual accepts as acceptable surveillance. This creates a problem since performing online surveillance would pose an infringement on the employees privacy and integrity. LÄS MER