Investigating Insider Threat Using Enterprise Security Management

2007 ◽  
pp. 351-398
2005 ◽  
Vol 13 (2) ◽  
pp. 121-134 ◽  
Author(s):  
Stephen C. Shih ◽  
H. Joseph Wen

Author(s):  
Zuhoor Abdullah Salim Al-Khanjari ◽  
Asaad Abdulrahman Nayyef

The increase of attacks on e-Government infrastructures led to the emergence of several information security techniques. Insider threat is one of the most complex problems in information security. It requires a sophisticated response to detect and protect the un-authorized use. This chapter provides a framework for developing a high level security management for e-Government website. The framework is based on the sensors and detectors, which consist of relatively small amounts of source code to detect all attacks in e-Government website against all threats in real time. In this chapter, the authors also provide a full illustration of how to design and protect all files used to implement a secure e-Government websites. This should contain a self- audit of the file and represent a kind of processes that are used to protect data in different types of files including: image, sound, string or any file within e-Government website.


Sign in / Sign up

Export Citation Format

Share Document