O'Reilly logo

Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within by Julie Mehan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Effective physical defenses also support the digital defensive mechanisms by restraining access to the network workstations and servers.

Digital Defenses

Recent events have led to extensive focus on the dangers of insider threat to information and information systems. Consequently, much more time has been spent in detailing how to employ layered digital defenses against the insider threat. In the technical environment, like the physical, the “concurrent employment of protection tools of different origins and the same fundamental purpose provides variability in the technical approach to protection. This increases the likelihood of success”.134

Thus a combination of policies, physical controls, and technical controls, such as firewalls, intrusion ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required