End User Computing Environments for Improved Information Security

Access control does not prevent an authorized "Insider" inadvertently or deliberately leaking information to an unauthorized external or internal party. The "Insider threat" is one of the greatest threats to enterprise security, and nearly 70% of recently surveyed organizations view Web 2.0 (and by extension cloud computing environments) as a serious data loss risk. The primary focus has been on Data Loss Prevention (DLP) methods to prevent "Malicious" data leakage; data leakage includes data loss as well as inadvertent data sharing. In today's highly interconnected world, with a proliferation of camera equipped cell phones, preventing data loss by a determined insider, possibly in collusion with other insiders is impossible.

Provided by: IARIA Topic: Security Date Added: Aug 2011 Format: PDF

Find By Topic