ABSTRACT

In a holistic view, information security is a triad of people, process, and technology. Appropriate

technology must be combined with management support, understood requirements, clear policies,

trained and aware users, and plans and processes for its use. While the perimeter is traditionally

emphasized, threats from inside have received less attention. Insider threats are potentially more serious

because an insider already has knowledge of the target systems. When dealing with insider threats, people

and process issues are paramount. Also, too often, security measures are viewed as a box to install

(technology) or a one-time review. Security is an ongoing process, never finished.