Technical Barriers to Monitoring, Detecting, and Investigating Insider Fraud

Examines the limitations of common security controls when it comes to controlling insider abuse, with special attention to the types of abuse that can occur when insiders have legitimate access to enterprise information systems. We examine the problem of insider abuse by discussing
-Special challenges with insider abuse
-Examples of insider abuse
– Five key challenges to detecting insider abuse


Read more: Technical Barriers to Monitoring, Detecting, and Investigating Insider Fraud

Story added 19. July 2012, content source with full text you can find at link above.