Protecting Against Insider Attacks - SANS Institute [PDF]

4 downloads 254 Views 961KB Size Report
identify causes and how to best prepare defenses against them. .... emails, posting messages on blogs, hosting SharePoint or intranet sites, .... Page 10 ..... means of preventing data leakage over the web is to implement a proxy or filter that.
Interested in learning more about security?

SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission.

Protecting Against Insider Attacks This paper will discuss the key factors in helping to enhance security to protect a company from internal attacks. Most companies focus their resources and defensive strategies on protecting the perimeter from outsider attacks but often the greatest damage can be done by someone already inside these defenses. System administrators can be a company s most trusted ally or their worst nightmare depending on their motivation or personal interest. It is imperative that companies implement internal controls to m...

AD

Copyright SANS Institute Author Retains Full Rights

. hts

rig

Protecting Against Insider Attacks

ful l

GIAC (GCIH) Gold Certification

eta

ins

!"#$%&'()&*+(,"--.&#/(0&*+&"--.{*4567%3( !+849%&'(,47:(;*

©

SA

NS

Administrative Tools on all Windows servers. An example of this GUI is shown below:

((((((((((((((((((((((((((((((((((((((((((((((((((((((((

E(N%&(*++4#4%

Suggest Documents