ABSTRACT
In a holistic view, information security is a triad of people,
process, and technology. Appropriate technology must be
combined with management support, understood require-
ments, clear policies, trained and aware users, and plans
and processes for its use.While the perimeter is traditionally
emphasized, threats from inside have received less attention.
Insider threats are potentially more serious because an insi-
der already has knowledge of the target systems. When
dealing with insider threats, people and process issues are
paramount. Also, too often, security measures are viewed as
a box to install (technology) or a one-time review. Security
is an ongoing process, never finished.