Investigation of attributes that influence the insider trust

A study of cyber-attack incidents emanating from insiders identifies some characteristic of the malicious user including trust, attack on hardware, software and network, and vulnerabilities of threat. Among the research that has been conducted, insider trust is identified as a critical characteristi...

Full description

Saved in:
Bibliographic Details
Main Authors: Hassan, R., Ismail, I., Kasim, S., Othman, M. R., Ramlan, R.
Format: Article
Language:English
Published: Insight Society 2017
Subjects:
Online Access:http://eprints.utm.my/id/eprint/81228/1/RohayantiHassan2017_InvestigationofAttributesthatInfluencetheInsider.pdf
http://eprints.utm.my/id/eprint/81228/
http://dx.doi.org/10.18517/ijaseit.7.5.3406
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first