Along with the variety of insiders is associated a variety


Please paraphrase the below

Types of Insider Misuse

Along with the variety of insiders is associated a variety of types of insider misuse. One immediate categorization involves user intent, as in intentional versus acciden- tal misuse (noted above). Even among intentional misuse, there is a wide range of possible actions - from outright malice to relatively benign annoyance, with many degrees in between. However, whether the cause is accidental or intentional is some- times not clear.

A second categorization involves the evidential nature of the misuse, that is, whether the misuse is intended to be detected or hidden. System and network de- nials of service may be overt, in that they are readily obvious once they are enabled. However, stealthy Trojan horses that act as sniffers or that quietly leak information are typically intended to be covert, and may be intended to remain undetected as long as possible.

Although the focus here is primarily on intentionally malicious misuse, it is gen- erally unwise to ignore accidental misuse. For example, the apparent success of what might be considered accidental but tolerated misuse could easily inspire subsequent malicious misuse. Furthermore, it is generally unwise to ignore stealthy forms of misuse. To the extent that detecting accidental misuse can be dealt with by the same mechanisms that are used for intentional misuse, accidental misuse need not be treated separately. Similarly, to the extent that stealthy misuse can be dealt with by

the same mechanisms that are used for more obvious misuse, stealthy misuse need not be treated separately - apart from possibly additional means of detecting it. Because seemingly accidental misuse may in fact be intentional misuse in disguise, stealthy misuse can be extremely dangerous; as a consequence, it is potentially risky to ignore any particular mode of insider misuse. Nevertheless, responses may differ depending on whether the cause is deemed to be accidental or malicious.

Solution Preview :

Prepared by a verified Expert
Business Management: Along with the variety of insiders is associated a variety
Reference No:- TGS02733028

Now Priced at $20 (50% Discount)

Recommended (96%)

Rated (4.8/5)