Effective physical defenses also support the digital defensive mechanisms by restraining access to the network workstations and servers.
Digital Defenses
Recent events have led to extensive focus on the dangers of insider threat to information and information systems. Consequently, much more time has been spent in detailing how to employ layered digital defenses against the insider threat. In the technical environment, like the physical, the “concurrent employment of protection tools of different origins and the same fundamental purpose provides variability in the technical approach to protection. This increases the likelihood of success”.134
Thus a combination of policies, physical controls, and technical controls, such as firewalls, intrusion ...
Get Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.