Abstract
These days, cybercriminals are looking to steal more than just banking information.
Index Terms
- The theft of business innovation: an ACM-BCS roundtable on threats to global competitiveness
Recommendations
Detecting Insider Theft of Trade Secrets
Trusted insiders who misuse their privileges to gather and steal sensitive information represent a potent threat to businesses. Applying access controls to protect sensitive information can reduce the threat but has significant limitations. Even if ...
Laptop theft: a case study on the effectiveness of security mechanisms in open organizations
CCS '10: Proceedings of the 17th ACM conference on Computer and communications securityOrganizations rely on physical, technical and procedural mechanisms to protect their IT systems. Of all IT systems, laptops are the probably the most troublesome to protect, since they are easy to remove and conceal. When the thief has physical ...
Comments