Abstract
The current ubiquity of information coupled with
the reliance on such data by businesses has led to a great
deal of resources being deployed to ensure the security of this
information. Threats can come from a number of sources and the
dangers from those insiders closest to the source have increased
significantly recently. This paper focuses on techniques used to
identify and manage threats as well as the measures that every
organisation should consider to put into action. A novel game-based
onion skin model has been proposed, combining techniques
used in theory-based and hardware-based hardening strategies.
Information
Library
Documents
Statistics
Downloads
Downloads per month over past year