Provided by:
International Journal of Computer Networks and Wireless Communications (IJCNWC)
Topic:
Security
Format:
PDF
It is widely recognized that the threat to enterprises from insider activities is increasing and that significant costs are being incurred. The multi-faceted dimensions of insider threat and compromising actions have resulted in a diverse experience and understanding of what insider threats are and how to detect or prevent them. In this paper, the authors investigate the potential for near real-time detection of insider threat activities within a large enterprise environment using monitoring tools centered on the information infrastructure.