Search For:

Displaying 1-1 out of 1 total
Reporting Insider Threats via Covert Channels
Found in: 2013 IEEE CS Security and Privacy Workshops (SPW2013)
By David N. Muchene,Klevis Luli,Craig A. Shue
Issue Date:May 2013
pp. 68-71
Trusted insiders that betray an organization can inflict substantial harm. In addition to having privileged access to organization resources and information, these users may be familiar with the defenses surrounding valuable assets. Computers systems at th...
   
 1