The author is the lead information security architect at one of the United States' largest banks. In this paper he assesses the threat of confidential data leakage, focusing on its most virulent form -- insider data theft attacks. Technological and procedural controls typically found in enterprise environments are reviewed and found inadequate. Additional controls are proposed, and several areas for additional technical research are also suggested.
CITATION STYLE
McCormick, M. (2008). Data Theft: A Prototypical Insider Threat. Advances in Information Security, 39, 53–68. https://doi.org/10.1007/978-0-387-77322-3_4
Mendeley helps you to discover research relevant for your work.