Article ID Journal Published Year Pages File Type
458181 Information Security Technical Report 2008 4 Pages PDF
Abstract

A wide variety of different techniques and technologies are potentially applicable for ISMS insider intrusion prevention and detection. In this report we examine three approaches that have not been reviewed in any great detail recently, namely: simulation and modelling, scenario gaming and game theory, and artificial learning technologies. We show how each of these diverse approaches might be applicable to particular corporate scenarios that may eventuate as a result of potential insider intrusions into an ISMS.

Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
,