Thumbnail
Access Restriction
Subscribed

Author Ford, Richard ♦ Thompson, Herbert H
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Abstract Every year corporations and government installations spend millions of dollars fortifying their network infrastructures. Firewalls, intrusion detection systems, and antivirus products stand guard at network boundaries, and individuals monitor countless logs and sensors for even the subtlest hints of network penetration. Vendors and IT managers have focused on keeping the wily hacker outside the network perimeter, but very few technological measures exist to guard against insiders - those entities that operate inside the fortified network boundary. The 2002 CSI/FBI survey estimates that 70 percent of successful attacks come from the inside. Several other estimates place those numbers even higher.
Description Affiliation: Florida Institute of Technology (Ford, Richard) || Security Innovation (Thompson, Herbert H)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2010-04-01
Publisher Place New York
Journal Queue (QUEUE)
Volume Number 2
Issue Number 4
Page Count 8
Starting Page 58
Ending Page 65


Open content in new tab

   Open content in new tab
Source: ACM Digital Library