|
Volumn , Issue , 2009, Pages 233-
|
Implementing PII honeytokens to mitigate against the threat of malicous insiders
|
Author keywords
[No Author keywords available]
|
Indexed keywords
ACCESSING DATA;
CASE DATABASE;
CREDIT CARDS;
DIGITAL INFORMATION;
E-MAIL ADDRESS;
EARLY WARNING SYSTEM;
EXTENSIVE RESOURCES;
FOREIGN COUNTRIES;
FULL-SWING;
GOVERNMENT EMPLOYEES;
HONEY NET;
HONEYPOTS;
IDENTITY THEFT;
INSIDER THREAT;
MALICIOUS INSIDERS;
NATIONAL SECURITY;
PERSONAL INFORMATION;
PERSONALLY IDENTIFIABLE INFORMATION;
PHYSICAL SYSTEMS;
PRESIDENTIAL ELECTION;
RISK PROFILE;
SEARCH RESULTS;
SENSITIVE INFORMATIONS;
TELEPHONE NUMBERS;
WORK IN PROGRESS;
COMPETITION;
INFORMATION RETRIEVAL;
INTERSYMBOL INTERFERENCE;
PERSONNEL;
SPEECH RECOGNITION;
WORLD WIDE WEB;
SEARCH ENGINES;
|
EID: 70350061913
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ISI.2009.5137315 Document Type: Conference Paper |
Times cited : (12)
|
References (5)
|