Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
458181 | Information Security Technical Report | 2008 | 4 Pages |
Abstract
A wide variety of different techniques and technologies are potentially applicable for ISMS insider intrusion prevention and detection. In this report we examine three approaches that have not been reviewed in any great detail recently, namely: simulation and modelling, scenario gaming and game theory, and artificial learning technologies. We show how each of these diverse approaches might be applicable to particular corporate scenarios that may eventuate as a result of potential insider intrusions into an ISMS.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Richard E. Overill,