This resource is no longer available

Cover Image

This article in our Royal Holloway Information Security Thesis Series provides an examination of a malicious insider attack as a sequence of phases and a practical 10-step programme for mitigating the threat.

Contents include:

- Advanced intelligence-led cyber defence

- Malicious insiders

- The phases of a malicious insider attack

Vendor:
TechTarget ComputerWeekly.com
Posted:
Feb 8, 2021
Published:
Mar 12, 2015
Format:
PDF
Type:
Essential Guide

This resource is no longer available.