Rogue Internal Operatives
Another aspect in the human vector of access controls are rogue internal operatives. Disgruntled employees can pose a major threat to information security in the forms of theft, sabotage, vandalism, and more. The best way to handle these threats is by embracing a least-privileged access control policy. By limiting users to the least amount of access they need to accomplish their tasks, the damage they could do is limited.
- 5. Unauthorized Access and Security Breaches
- from Access Control, Authentication, and Public Key Infrastructure
- Publisher: Jones & Bartlett Learning
- Released: October 2010
Share this highlighthttp://www.safaribooksonline.com/a/access-control-authentication/2024/