Click Here for
Track Your Paper
ISSN:2454-4116

International Journal of New Technology and Research

Impact Factor 3.953

(An ISO 9001:2008 Certified Online Journal)
India | Germany | France | Japan

The Insider Threats

( Volume 1 Issue 1,May 2015 ) OPEN ACCESS
Author(s):

Marwan Albahar

Abstract:

This paper is aimed at discussing on how the so called privileged users place the important data at a risk. Also, this paper will handle issues to do with how data in some organizations are violated by intrinsic users via malicious actions. In this respect, this paper will shed light on three dimensions in which sensitive information can be protected. To start with, how can one restrict the degree of access to the sensitive info even if the user is logged in with strong accounts for instance administrator’s access? How can organizations set rules to safeguard sensitive data plus implement new technologies on the same? And lastly, what is the process and order needed for mitigation in case of leakage in data?

Let’s start by limiting the access of the users even when logged in with the administrator accounts which are the most powerful; in order to have a high level of data security, creating an account with least privileges will be a good move in respect to data security. More so, it is good to examine the actions of the privileged user’s action and the risk that they might cause.

 Also, it is good to implement the best technology that will ensure that the data of a certain organization is not pruned to any form of internal risk. This guarantees the organization of safety of information from the intrinsic side. To start with, the most effective way to reduce the risk of sensitive data is by applying data-centric security; i.e. the manner in which data-centric security is employed plus the presented authorization procedure. This should be followed by the establishment of the firewall as the second procedure in the process of authorization and authentication. The firewall building and the huge of implementation are aimed at time-wastage reduction.

Paper Statistics:

Total View : 735 | Downloads : 726 | Page No: 16-21 |

Cite this Article:
Click here to get all Styles of Citation using DOI of the article.