Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat.
Oliver BuckleyJason R. C. NursePhilip A. LeggMichael GoldsmithSadie CreesePublished in: STAST (2014)
Keyphrases
- security policies
- security architecture
- security management
- insider threat
- access control
- security requirements
- network security
- network management
- distributed systems
- security model
- databases
- knowledge management
- intrusion detection system
- access control policies
- data leakage prevention
- wireless sensor networks
- control system