O'Reilly logo

Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within by Julie Mehan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 4: INSIDER THREAT, BIG DATA AND THE CLOUD

The cloud computing model may be a wonderful system when it works; a nightmare when it fails.*Jamais Cascio73

Data protection in general, and in particular protection against the insider, has been rendered more difficult by technologies such as the Cloud and big data.

Increasingly, governmental and private organizations move toward consolidation of their information technology resources. In many cases, this means centralization, the dissolving of corporate-owned boundaries, the movement of data into the Cloud, and the evolution of ‘big data’. It doesn’t take long to understand that this consolidation of information leads to a higher target density – one of infinitely higher value to an insider ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required