Access your Pro+ Content below.
Mitigating the cyber threat from malicious insiders
Sponsored by ComputerWeekly.com
This article in our Royal Holloway Information Security Thesis Series provides an examination of a malicious insider attack as a sequence of phases and a practical 10-step programme for mitigating the threat.
Table Of Contents
- Advanced intelligence-led cyber defence
- Malicious insiders
- The phases of a malicious insider attack