Access your Pro+ Content below.
Mitigating the cyber threat from malicious insiders
Sponsored by ComputerWeekly.com
This article in our Royal Holloway Information Security Thesis Series provides an examination of a malicious insider attack as a sequence of phases and a practical 10-step programme for mitigating the threat.
Table Of Contents
- Advanced intelligence-led cyber defence
- Malicious insiders
- The phases of a malicious insider attack
Access this CW+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.