Framework of human behavior to mitigate the insider threat
Insider threat is rapidly becoming the largest information security problem that organizations face. With granted access to internal systems, it is becoming increasingly harder to protect organizations from malicious insiders. The typical methods of mitigating insider threat are simply not working,...
| Auteur principal: | Badawi, Jihad Wajeeh |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2013
|
| Sujets: | |
| Accès en ligne: | http://eprints.utm.my/33180/5/JihadWajeehBadawiMFSKSM2013.pdf |
Documents similaires
Insider threat risk management framework
par: Mohd. Ambar, Mohd. Hafiz
Publié: (2012)
par: Mohd. Ambar, Mohd. Hafiz
Publié: (2012)
Threat analysis using artificial neural network
par: Yee, Chan Pheng
Publié: (2009)
par: Yee, Chan Pheng
Publié: (2009)
Ensemble of classifiers for detection of advanced persistent threat
par: Chizoba, Okwara Jerry
Publié: (2019)
par: Chizoba, Okwara Jerry
Publié: (2019)
The development of insider threat prevention framework within organization
par: Rahimah Mohamad Zuwita@Abu Bakar
Publié: (2023)
par: Rahimah Mohamad Zuwita@Abu Bakar
Publié: (2023)
Fuzzy based threat analysis in total hospital information system
par: Mohamad Zain, Nurzaini
Publié: (2009)
par: Mohamad Zain, Nurzaini
Publié: (2009)
Alogrithm to prevent and detect insider multi transaction malicious activity in database
par: Khavidaki, Seyyed Mojtaba Dashti
Publié: (2013)
par: Khavidaki, Seyyed Mojtaba Dashti
Publié: (2013)
Hybrid detection for databases using SQL injection and insider misuse detection techniques
par: Asmawi, Aziah
Publié: (2010)
par: Asmawi, Aziah
Publié: (2010)
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
par: Ali Mohamed, Nachaat Abdelatif
Publié: (2022)
par: Ali Mohamed, Nachaat Abdelatif
Publié: (2022)
Active firewall mechanism as a comprehensive approach towards minimizing internet threats
par: Crysdian, Cahyo
Publié: (2006)
par: Crysdian, Cahyo
Publié: (2006)
Insider threats detection model for email content using statistical analysis
par: Mohammad, Nur Ameera Natasha
Publié: (2022)
par: Mohammad, Nur Ameera Natasha
Publié: (2022)
Shoulder surfing security threat prevention using shifting directions / Tey Boon Hau
par: Tey, Boon Hau
Publié: (2018)
par: Tey, Boon Hau
Publié: (2018)
Exploring insider threats using organisational performance framework in Malaysian manufacturing case
par: Isnin, Siti Norfatihah
Publié: (2024)
par: Isnin, Siti Norfatihah
Publié: (2024)
Multi-shape symmetric encryption mechanism for nongeneric attacks mitigation
par: Abdelgader, Abdelrahman Abdelgader Altigani
Publié: (2022)
par: Abdelgader, Abdelrahman Abdelgader Altigani
Publié: (2022)
Enhancement of serins to mitigate passive wormhole attack in wireless sensor networks
par: Modirkhazeni, Ali
Publié: (2011)
par: Modirkhazeni, Ali
Publié: (2011)
A framework of meaningful sharing behavior of authentic holy Quran content on facebook / Suraya Ika Tamrin
par: Suraya Ika , Tamrin
Publié: (2021)
par: Suraya Ika , Tamrin
Publié: (2021)
Mathematical models for mitigating energy holes in corona-based wireless sensor network
par: Asadollahi, Hassan
Publié: (2014)
par: Asadollahi, Hassan
Publié: (2014)
Identify Human Error In Using Mobile Device That Lead To Security Threat
par: Abdul Mubin, Norzul Masri
Publié: (2017)
par: Abdul Mubin, Norzul Masri
Publié: (2017)
Proxcache: A new cache deployment strategy in information-centric network for mitigating path and content redundancy
par: Ibrahim, Abdullahi
Publié: (2016)
par: Ibrahim, Abdullahi
Publié: (2016)
QoS enabled cross-layered clustering for mitigating flooding queries in internet of thing networks / Fawad Ali Khan
par: Fawad , Ali Khan
Publié: (2022)
par: Fawad , Ali Khan
Publié: (2022)
Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke
par: Henry Friday , Nweke
Publié: (2019)
par: Henry Friday , Nweke
Publié: (2019)
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
par: Hazem Jihad , Ali Badarneh
Publié: (2021)
par: Hazem Jihad , Ali Badarneh
Publié: (2021)
A case study of health information system workflow on mitigating opioid drug abuse in Saudi Arabia's healthcare system / Alogaili Fahad Abdulrahman
par: Alogaili, Fahad Abdulrahman
Publié: (2021)
par: Alogaili, Fahad Abdulrahman
Publié: (2021)
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
par: Bilal , Ishfaq
Publié: (2016)
par: Bilal , Ishfaq
Publié: (2016)
IT supported project based learning framework
par: Mohammed Hamouda, Mohammed Elgasim
Publié: (2010)
par: Mohammed Hamouda, Mohammed Elgasim
Publié: (2010)
Multiple channels framework for e marketing
par: Torkaman, Hassan
Publié: (2011)
par: Torkaman, Hassan
Publié: (2011)
Interpretative key management framework (IKM)
par: Chaeikar, Saman Shojae
Publié: (2010)
par: Chaeikar, Saman Shojae
Publié: (2010)
Reusable framework for web application development
par: Samingan, Mohd. Razak
Publié: (2017)
par: Samingan, Mohd. Razak
Publié: (2017)
Information security curriculum framework at undergraduate level
par: Sanusi Arifin, Ab. Arif
Publié: (2009)
par: Sanusi Arifin, Ab. Arif
Publié: (2009)
Blockchain-enabled cybersecurity framework for healthcare domain
par: Islam, Md Shohidul
Publié: (2025)
par: Islam, Md Shohidul
Publié: (2025)
Mobile augmented reality tourism application framework
par: Abd. Rashid, Rashidi
Publié: (2017)
par: Abd. Rashid, Rashidi
Publié: (2017)
Personalisation framework for Malaysian m-government service
par: Abu Bakar, Noor Suriana
Publié: (2022)
par: Abu Bakar, Noor Suriana
Publié: (2022)
Architecture based framework for dynamic software adaptation
par: Elias, Hidayah
Publié: (2007)
par: Elias, Hidayah
Publié: (2007)
Biodiversity data model using pyramid framework
par: Kamruzzaman, A. Z. M.
Publié: (2007)
par: Kamruzzaman, A. Z. M.
Publié: (2007)
Humanizing factors for hotel online booking
par: Azmi, Lina Fatini
Publié: (2020)
par: Azmi, Lina Fatini
Publié: (2020)
Human heart modeling / Azrizal Ismail
par: Azrizal, Ismail
Publié: (2003)
par: Azrizal, Ismail
Publié: (2003)
Trusted cloud computing framework in critical industrial application
par: Bamiah, Mervat Adib
Publié: (2015)
par: Bamiah, Mervat Adib
Publié: (2015)
Decision support framework for procurement system in University of Babylon
par: Abid, Rahman Nahi
Publié: (2014)
par: Abid, Rahman Nahi
Publié: (2014)
Knowledge audit process framework for inter-agencies collaboration
par: Ahmad, Nur Syufiza
Publié: (2016)
par: Ahmad, Nur Syufiza
Publié: (2016)
Regression testing framework for test cases generation and prioritization
par: Osman, Eglal Mohammed Khalifa
Publié: (2022)
par: Osman, Eglal Mohammed Khalifa
Publié: (2022)
Usability framework for mobile augmented reality language learning
par: Lim, Kok Cheng
Publié: (2022)
par: Lim, Kok Cheng
Publié: (2022)
Documents similaires
-
Insider threat risk management framework
par: Mohd. Ambar, Mohd. Hafiz
Publié: (2012) -
Threat analysis using artificial neural network
par: Yee, Chan Pheng
Publié: (2009) -
Ensemble of classifiers for detection of advanced persistent threat
par: Chizoba, Okwara Jerry
Publié: (2019) -
The development of insider threat prevention framework within organization
par: Rahimah Mohamad Zuwita@Abu Bakar
Publié: (2023) -
Fuzzy based threat analysis in total hospital information system
par: Mohamad Zain, Nurzaini
Publié: (2009)