Abstract

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

1.

Abstract With the development of Information Technology (IT) and the growing reliance on widely interconnected information systems, new problems such as the insider threat have started to surface and become more significant. As a result, companies and governments have begun to actively engage the use of external systems to detect and deter these problems which are known to incur huge costs and cause irreparable damages on affected organizations.

This research paper begins by firstly defining some of the insider threats, namely the malicious and oblivious insiders. The effective defences and preventive measures against these threats will be covered in our literature review. Following which, three commercially available insider threat detection and management systems were identified. The systems are Overtis, Raytheon and ArcSight, and comprehensive product reviews and evaluations of the effectiveness of these systems were considered.

For the purpose of comparison, we highlighted their special features and their methods of managing threats and finally conclude with some future developments and our insights to insider threat detection and management.

This research paper aims to provide our readers with an in-depth understanding on insider threats, their common methods of attack and how to effectively manage and prevent these threats. Hence, we chose to focus on reviewing various insider threat detection and management software that are currently readily available in the market. We hope that this research paper will help readers on their decision-making processes of selecting a product that will be most suitable for their personal or companys business needs.

You might also like