Insiders: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
(One intermediate revision by the same user not shown) | |||
Line 2: | Line 2: | ||
{| class="wikitable" | {| class="wikitable" | ||
|- | |- | ||
| style="width: 50%; vertical-align: top;" colspan="2" | [[File:ACT_Insiders_Icon.svg|frameless|40px|link= | | style="width: 50%; vertical-align: top;" colspan="2" | [[File:ACT_Insiders_Icon.svg|frameless|40px|link=Insiders]] <big>'''Introduction'''</big> <br> | ||
In the ever-evolving landscape of cybersecurity, threats come from various sources, but perhaps one of the most challenging to combat is the threat posed by insiders. Insiders, who are often trusted employees or individuals within an organization, have privileged access to sensitive information, systems, and networks. While not all insiders have malicious intent, their actions can inadvertently or intentionally compromise an organization's security. | In the ever-evolving landscape of cybersecurity, threats come from various sources, but perhaps one of the most challenging to combat is the threat posed by insiders. Insiders, who are often trusted employees or individuals within an organization, have privileged access to sensitive information, systems, and networks. While not all insiders have malicious intent, their actions can inadvertently or intentionally compromise an organization's security. | ||
| style="width: 50%; vertical-align: top;" colspan="2" | [[File:stalking-hyenas.png|frameless|100px|right|link=Top_Threats]] | | style="width: 50%; vertical-align: top;" colspan="2" | [[File:stalking-hyenas.png|frameless|100px|right|link=Top_Threats]]<strong>Cybersecurity Tools</strong> | ||
{{#categorytree:Identity & Access Management|mode=collapsed}} | |||
{{#categorytree:Periodic Know Your Users Reviews|mode=collapsed}} | |||
{{#categorytree:Security Awareness & Training|mode=collapsed}} | |||
{{#categorytree:Security Information & Event Management (SIEM)|mode=collapsed}} | |||
{{#categorytree:Identity & Access Management|mode= | {{#categorytree:Anti-virus & Anti-malware Software|mode=collapsed}} | ||
{{#categorytree:Periodic Know Your Users Reviews|mode= | {{#categorytree:Phishing|mode=collapsed}} | ||
{{#categorytree:Security Awareness & Training|mode= | |||
{{#categorytree:Security Information & Event Management (SIEM)|mode= | |||
{{#categorytree:Anti-virus & Anti-malware Software|mode= | |||
{{#categorytree:Phishing|mode= | |||
|- | |- | ||
| style="width: 50%; vertical-align: top;" colspan="2" | <big>'''Types of Malware'''</big><br> | | style="width: 50%; vertical-align: top;" colspan="2" | <big>'''Types of Malware'''</big><br> |