Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Insider Threat

Handbook of Research on Securing Cloud-Based Databases with Biometric Applications
An individual that is a current employee or contractor that misuses their authorization to gain access to important information or data.
Published in Chapter:
Cloud Security: Implementing Biometrics to Help Secure the Cloud
Natasha Csicsmann (Pennsylvania State University – Altoona, USA), Victoria McIntyre (Pennsylvania State University – Altoona, USA), Patrick Shea (Pennsylvania State University – Altoona, USA), and Syed S. Rizvi (Pennsylvania State University – Altoona, USA)
DOI: 10.4018/978-1-4666-6559-0.ch011
Strong authentication and encryption schemes help cloud stakeholders in performing the robust and accurate cloud auditing of a potential service provider. All security-related issues and challenges, therefore, need to be addressed before a ubiquitous adoption of cloud computing. In this chapter, the authors provide an overview of existing biometrics-based security technologies and discuss some of the open research issues that need to be addressed for making biometric technology an effective tool for cloud computing security. Finally, this chapter provides a performance analysis on the use of large-scale biometrics-based authentication systems for different cloud computing platforms.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Cyber Insider Threat in Virtual Organizations
Situations where a critical member of an organization with authorized access, high social power and holding a critical job position, inflicts damage within an organization. In a way, this critical member behaves against the interests of the organization, generally in an illegal and/or unethical manner.
Full Text Chapter Download: US $37.50 Add to Cart
Employee Surveillance Based on Free Text Detection of Keystroke Dynamics
a potential risk caused by a trusted individual misusing the given privileges to compromise system security.
Full Text Chapter Download: US $37.50 Add to Cart
The Electronic Hive Mind and Cybersecurity: Mass-Scale Human Cognitive Limits to Explain the “Weakest Link” in Cybersecurity
The risk from a malicious agent who works within the organization and has the advantage of insider knowledge and insider access and internal trust-based social networks.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR