CW+ Premium Content/E-Handbooks

Thank you for joining!
Access your Pro+ Content below.
March 2015

Mitigating the cyber threat from malicious insiders

Sponsored by ComputerWeekly.com

This article in our Royal Holloway Information Security Thesis Series provides an examination of a malicious insider attack as a sequence of phases and a practical 10-step programme for mitigating the threat.

Table Of Contents

 

  • Advanced intelligence-led cyber defence
  • Malicious insiders
  • The phases of a malicious insider attack