Human factors in information security: The insider threat - Who can you trust these days?

@article{Colwill2009HumanFI,
  title={Human factors in information security: The insider threat - Who can you trust these days?},
  author={C. Colwill},
  journal={Inf. Secur. Tech. Rep.},
  year={2009},
  volume={14},
  pages={186-196}
}
  • C. Colwill
  • Published 2009
  • Computer Science
  • Inf. Secur. Tech. Rep.
  • This paper examines some of the key issues relating to insider threats to information security and the nature of loyalty and betrayal in the context of organisational, cultural factors and changing economic and social factors. It is recognised that insiders pose security risks due to their legitimate access to facilities and information, knowledge of the organisation and the location of valuable assets. Insiders will know how to achieve the greatest impact whilst leaving little evidence… CONTINUE READING
    258 Citations
    Information security policies: A review of challenges and influencing factors
    • 17
    Employees' information security awareness and behavioural intentions in Higher Education Institutions in Oman
    Information security research: External hacking, insider breach, and profound technologies
    Multiple Case Study Approach to Identify Aggravating Variables of Insider Threats in Information Systems
    • 5
    • PDF
    THE RELATIONSHIP OF INFORMATION SECURITY KNOWLEDGE (ISK) AND HUMAN FACTORS: CHALLENGES AND SOLUTION
    • 4
    • Highly Influenced
    • PDF

    References

    SHOWING 1-10 OF 29 REFERENCES
    Dealing with the malicious insider
    • 12
    The Congruence Model A Roadmap for Understanding Organizational Performance
    • 2004
    • 16
    • PDF
    Department for business Enterprise and regulatory Reform (BERR) information security breaches survey
    • Department for business Enterprise and regulatory Reform (BERR) information security breaches survey
    • 2008
    Insiders cause most IT security breaches, Computer Weekly, 26/8/09, http://www.computerweekly.com/Articles/ 2009/08/26/237455/insiders-cause-most-it-security-breaches- study-reveals.htm
    • Insiders cause most IT security breaches, Computer Weekly, 26/8/09, http://www.computerweekly.com/Articles/ 2009/08/26/237455/insiders-cause-most-it-security-breaches- study-reveals.htm
    • 2009
    Addressing the insider threat with NetIQ security and Administration Solutions Dr. Eric Cole and NetIQ
    • Addressing the insider threat with NetIQ security and Administration Solutions Dr. Eric Cole and NetIQ
    • 2008
    1, technical risk assessment part 1 (Issue 3.2)
    • 1, technical risk assessment part 1 (Issue 3.2)
    • 2008
    Addressing the insider threat, community Banker
    • Addressing the insider threat, community Banker
    • 2007
    Balancing risk and reward in staff web usage policies, Computer Weekly
    • Balancing risk and reward in staff web usage policies, Computer Weekly
    • 2010
    Beware the enemy within, secure computing Magazine, 5/1/09, http://www.scmagazineuk.com/Beware-the-enemy- within/article
    • Beware the enemy within, secure computing Magazine, 5/1/09, http://www.scmagazineuk.com/Beware-the-enemy- within/article
    • 2009
    Beware the insider security threat, CIO Jury, 17/4/08, http://www.silicon.com/management/cio-insights
    • Beware the insider security threat, CIO Jury, 17/4/08, http://www.silicon.com/management/cio-insights
    • 2008