cyber threat protection

Discussion in 'Computer Science & Culture' started by deepslate, Jan 12, 2017.

  1. deepslate Registered Member

    Messages:
    60
    Hi. How do you call a hacker within the company? Not sure if "cracker" or "insider". Anyway, just little survey for cyber threat protection. What could be a good solution for insider threats and other forms of hacking? Thanks.
     
  2. Google AdSense Guest Advertisement



    to hide all adverts.
  3. Han Registered Member

    Messages:
    5
    Do you mean a hacker who is doing malicious things at a company he works for? That's called being an insider.

    Or do you mean a person who gets hired to pretend to be an external hacker so he can find security problems? That's called being a penetration tester.
     
  4. Google AdSense Guest Advertisement



    to hide all adverts.
  5. C C Consular Corps - "the backbone of diplomacy" Valued Senior Member

    Messages:
    3,403
    Accidental and negligent based vulnerabilities are diminished by better security training and education for employees. There must also be effective consequences for not adhering to security policies (pay reduction or something if the company cannot survive a firing epidemic of special-skilled labor that's blemished by a persistently sloppy safeguard record).

    For deliberate insider threats, the company will just have to bite the bullet and invest in pervasive monitoring, more diligent updated background checks, and tighten standards for what particular employees have access to in terms of secrets, classified information, and intellectual property. The consensus permission of two or more top hierarchy people might be required to offset the chance of even one of them being compromised, when it comes to venturing beyond the software protection of the deepest, sacred files. Systematic, regulated paranoia becomes an unavoidable defense.
     
  6. Google AdSense Guest Advertisement



    to hide all adverts.
  7. sculptor Valued Senior Member

    Messages:
    8,476
    as/re hacking protection, think "maginot line".
     
  8. deepslate Registered Member

    Messages:
    60
    Do you think file server auditing would be helpful? We're planning to get a solution for this along with one for privilege management. I'm hoping that that'll do the trick.
     

Share This Page