TY - GEN
T1 - Countering insider threats in personal devices
AU - Boral, Luk
AU - Disla, Maria
AU - Patil, Shivraj
AU - Williams, Jari
AU - Park, Joon S.
PY - 2007
Y1 - 2007
N2 - The Information Age is a time when organizations are networked back and forth with multiple wires, different communication channels, many sophisticated information systems, and most importantly through the almighty Internet This project focuses on responses that are most beneficial to organizations in regards to the internal threats Mainly, it addresses the issues connected to the broad use of laptops, desktops, and other personal devices such as flash drives. During research there were thought different ways of mitigating the issue of insider threats. The result of this analysis is the Diamond Theory. It ties four methods of increasing the security of personal devices: software design, information retrieval detection technology design and information policy design. All four corners of the diamond are represented by four different techniques that increase the security of personal devices and thus the defense against insider threats. These techniques are described as theoretical premises that shall be fulfilled in order to have the security raised to the maximum. Additionally, these methods are interdependent of each other and must work together to meet the overall goal of the theory.
AB - The Information Age is a time when organizations are networked back and forth with multiple wires, different communication channels, many sophisticated information systems, and most importantly through the almighty Internet This project focuses on responses that are most beneficial to organizations in regards to the internal threats Mainly, it addresses the issues connected to the broad use of laptops, desktops, and other personal devices such as flash drives. During research there were thought different ways of mitigating the issue of insider threats. The result of this analysis is the Diamond Theory. It ties four methods of increasing the security of personal devices: software design, information retrieval detection technology design and information policy design. All four corners of the diamond are represented by four different techniques that increase the security of personal devices and thus the defense against insider threats. These techniques are described as theoretical premises that shall be fulfilled in order to have the security raised to the maximum. Additionally, these methods are interdependent of each other and must work together to meet the overall goal of the theory.
UR - http://www.scopus.com/inward/record.url?scp=34748824169&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=34748824169&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:34748824169
SN - 1424413303
SN - 9781424413300
T3 - ISI 2007: 2007 IEEE Intelligence and Security Informatics
SP - 366
BT - ISI 2007
T2 - ISI 2007: 2007 IEEE Intelligence and Security Informatics
Y2 - 23 May 2007 through 24 May 2007
ER -