Index Terms
- Insider risks in elections
Recommendations
Insider threats to voting systems
GTIP '10: Proceedings of the 2010 Workshop on Governance of Technology, Information and PoliciesInsider attacks are particularly insidious threats to electoral integrity. Traitors that misuse the trust that is placed in them often have system access that facilitates malicious acts themselves and their subsequent cover-up efforts.
In this paper, we ...
Insider Threat Assessment: a Model-Based Methodology
Security is a major challenge for today's companies, especially ICT ones which manage large scale cyber-critical systems. Amongst the multitude of attacks and threats to which a system is potentially exposed, there are insider attackers i.e., users with ...
Detecting Insider Theft of Trade Secrets
Trusted insiders who misuse their privileges to gather and steal sensitive information represent a potent threat to businesses. Applying access controls to protect sensitive information can reduce the threat but has significant limitations. Even if ...
Comments