What principle can be used to help reduce insider threats to an organization?

What will be an ideal response?

System administrators, network managers, and technicians often have unfettered, and unmonitored, access to a company's most critical IT components. They're aware of any gaps in existing security processes and know how to cover up illegal activities. Following the "least privileges principle" can help reduce the insider threat, however. This principle specifies giving personnel only the access they need to perform their job duties and revoking access as soon as they no longer need it.

Computer Science & Information Technology

You might also like to view...

How do you write 2.5 ^ 3.1 in Java?

a. 2.5 * 3.1 b. Math.pow(2.5, 3.1) c. Math.pow(3.1, 2.5) d. 2.5 ** 3.1 e. 3.1 ** 2.5

Computer Science & Information Technology

addTogether();

By looking at the previous statement, you can tell that addTogether() ______. A. definitely returns a value B. may not return a value C. takes arguments D. does not take arguments E. It is not possible to tell whether or not it returns a value. F. It is not possible to tell whether or not it takes arguments.

Computer Science & Information Technology