2 hours 11 minutes
okay. In conclusion, this course provided a fundamental review of the problems in solution surrounding the insider threat. This course was designed to enable you
to be able to discuss and interpret and have that basic understanding so you could communicate on the subject in an academic environment, Professor Lim Professional Environment or what? Having
the concepts and topics that we just that we discussed, including the definition of the threat, the motivating factors, the attack methods, real world attack examples, prevention in detection tools and technologies of the trade and policy and process, which is kind of
foundation of your program.
This is some suggested reading. Take a look at it if you get a chance. There are so many resource is out there. I hope you do continue your learning path on this subject. If you have any questions, comments or suggestions, this is my contact info.
I really, really do appreciate you spending a small amount of time with me
to listen to what I have to say.
I wish you the best of luck and look for my future courses on Sai Berry.
Thank you very much.
Okay, so let's do the knowledge check. So question here when elevated privileges are abused and used to steal, damaged, exposed or alter sensitive information,
This is called what
type of attack
Course Assessment - Insider Threats