Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: July 25th, 2022

Insider Threats

Insider Threats
According to statistics insider threats pose the most potential for damage to data and network infrastructure. Do you agree? Or would you say the threat is external? What policies and procedures would you put into place to protect against these threats?

Your paper should meet the following requirements:

Be 3-4 pages in length, not including the cover page and reference page.

ccording to statistics insider threats pose the most potential for damage to data and network infrastructure. Do you agree? Or would you say the threat is external? What policies and procedures would you put into place to protect against these threats?

Your paper should meet the following requirements:

Be 3-4 pages in length, not including the cover page and reference page.

Introduction
The insider versus outsider threat is an ongoing debate that continues to play a role in organizational policy formulation. The world of network infrastructure and risk associated with network security is dynamic and always evolving. As such policy makers need to be aware of the role research plays in creating accurate approaches to risk mitigation. Organizations across the world have a variety of policies formulated to protect against outsider breach generally because it is easy to detect the breach and use a one-size-fits all measures. Giandomenico and Groot (2020) identify that of the two types of threats (Insider and Outsider), outsider threats are the most publicized and increasingly easily mitigated through traditional security measures. It is the insider threat that is hard to identify, detect or even mitigate since their origin usually is based on people who are fully aware of the system and potential regions for failures. Insider threats summarily represent threats that originate from within the company.
They may be propagated through malicious intent, frustrated employees, or even in the case of organizations that apply BYOD policies, they can be propagated unknowingly when employees are not able to fully secure their devices out of work. As such, unlike the outsider threat, insider threats are much harder to mitigate, detect since in their intrinsic form, they are unique and may not be similar to execution. A holistic approach to security and training of employees and people with access to the system needs to be implemented (Giandomenico and Groot, 2020). The security approach needs to be modern and considerate of the changing technology climate across the world. This is in a bid to create accurate and fully aware of the system and essential places of failure.
Insiders within an organization have access to sensitive information on various procedures within the company. In cases where they feel unsatisfied with elements within the organization, they may have an easier time to access the information and leak it or steal or compromise it. Researchers and policy makers need to pay attention to technological innovation, training and standards across the internet in formulating better policies. Organizations have the legal rights to monitor employee activity especially if they are compensating the same employees for work done. Concurrently they have an obligation to achieve profit using all legal means, and one way to do this is allowing their employees to bring their own devices to work. Companies’ goal in implementing monitoring policies is to increase employee “flexibility, convenience, and portability of devices in order to cater to their employees’ workflows, which increase their productivity and morale” (Dhingra, 2016, p179). Providing employees with good working conditions is a holistic approach to the problem. It categorically works to boost organizational and employee goal association. Making them more likely to appreciate their role within the organization.
The main issue surrounds employee monitoring and how companies navigate personal and company information access. Vallor and Rewak (2013) identify that numerous organizations continue to experience the challenges of monitoring their employees, using intrusive softwares, while also trying to navigate against making unjustifiable intrusion that might compromise the integrity and privacy of their employees’ personally identifiable information. In organizations that use personal employee devices employers have been cited to make intrusive measures that have often compromised employee data. Porteous (2020) acknowledges that organizations have the right to monitor, but in most cases, the employee monitoring softwares has been very intrusive and aggressive. This is a factor that they should consider in implementing some of these policies and technology.
In cases where an employee lost their device, the company fearing the content getting to the wrong hand, can implement a remote wipe protocol and clear the employees device. They should navigate this process with much caution to avoid also compromising employee PII such as pictures and other important health documents (Dhingra, 2016). This can be contrary to the employees’ needs. Dhingra (2016) additionally states that in efforts made to detect security breach most employees PII were captured and some lost in the process. Gurnato (2011) identifies in most cases employees have little protection against employers electronic monitoring even in their own devices which always lead to employee-employer conflict in the workplace.
Employers can also restrict employees from using Cameras or recorders on their own devices in the workplace, or monitor their emails and restrict authorization to private content especially at work all of which have been very effective in bringing about conflict. A holistic process not only considers the employees’ needs but also the company’s goals and needs. The company could for example implement: Data categorization. Providing data categorization works to create castes by access and authorization. It limits employees who access certain regions of the system and logs in their reason for access. This is a form of employee monitoring that is also effective as it gives administrators accountability. Better training of employees in their role as system administrators and managers is also a critical aspect of security protocols. This may include provision of simulated scenarios for the system breach in order to identify potential risks involved with employee access. Constant and honest evaluation of employee activities will also be a required element in employers. Device encryption and password need to be provided and constantly updated in an effort to increase surveillance and mitigate from breaches or internal failures.
Insider threat is far much riskier than outsider threat. This is because it does not follow a predefined procedure. Rather it may be brought about by a variety of reasons and its risks are company wide. Application of better policies on monitoring and encryption is a required approach in preventing insider threat risks.
References
Dhingra, M. (2016). Legal Issues in Secure Implementation of Bring Your Own Device
(BYOD). Retrieved 24 November 2020, from
https://pdf.sciencedirectassets.com/280203/1…
Giandomenico, N & Groot (2020). Insider vs. Outsider Data Security Threats: What’s the Greater
Risk? from https://digitalguardian.com/blog/insider-outsider-data-security-threats
Porteous, C. (2020). Can Employee Monitoring Be Done Ethically?. Retrieved 24
November 2020, from https://www.entrepreneur.com/article/356544
Vallor, Ph.D., S., & Rewak, S.J., W. (2013). An Introduction to Cyber Security Ethics.
Santa Clara University. doi: https://www.scu.edu/media/ethics-center/technology-
ethics/IntroToCybersecurityEthics.pdf

Order | Check Discount

Tags: Insider Threats

Assignment Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

To ensure professionalism, we carefully curate our team by handpicking highly skilled writers and editors, each possessing specialized knowledge in distinct subject areas and a strong background in academic writing. This selection process guarantees that our writers are well-equipped to write on a variety of topics with expertise. Whether it's help writing an essay in nursing, medical, healthcare, management, psychology, and other related subjects, we have the right expert for you. Our diverse team 24/7 ensures that we can meet the specific needs of students across the various learning instututions.

Affordable Prices

The Essay Bishops 'write my paper' online service strives to provide the best writers at the most competitive rates—student-friendly cost, ensuring affordability without compromising on quality. We understand the financial constraints students face and aim to offer exceptional value. Our pricing is both fair and reasonable to college/university students in comparison to other paper writing services in the academic market. This commitment to affordability sets us apart and makes our services accessible to a wider range of students.

100% Plagiarism-Free

Minimal Similarity Index Score on our content. Rest assured, you'll never receive a product with any traces of plagiarism, AI, GenAI, or ChatGPT, as our team is dedicated to ensuring the highest standards of originality. We rigorously scan each final draft before it's sent to you, guaranteeing originality and maintaining our commitment to delivering plagiarism-free content. Your satisfaction and trust are our top priorities.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.