International Journal For Multidisciplinary Research
E-ISSN: 2582-2160
•
Impact Factor: 9.24
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Reviewer Referral Program
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJFMR
Upcoming Conference(s) ↓
WSMCDD-2025
GSMCDD-2025
Conferences Published ↓
RBS:RH-COVID-19 (2023)
ICMRS'23
PIPRDA-2023
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 6 Issue 6
November-December 2024
Indexing Partners
Privileged User Access Audits Techniques for Identifying and Mitigating Insider Threats
Author(s) | Shiksha Rout |
---|---|
Country | India |
Abstract | In today's cyber security landscape, privileged user access audits are crucial for identifying and mitigating insider threats. These audits assess control mechanisms governing high-level access, focusing on potential abuse of privileges by insiders. Effective techniques for privileged user access audits include analyzing user behavior, reviewing change management compliance, and implementing anomaly detection systems. Ensuring alignment with security protocols, the auditing process highlights vulnerabilities linked to over-privileged accounts and lack of multi-factor authentication. By leveraging role-based access controls, continuous monitoring, and periodic re-evaluation, organizations can fortify their defenses against insider threats, improving overall resilience. This article presents best practices for enhancing compliance and security through rigorous audit frameworks and effective remediation strategies, ultimately ensuring a secure access environment for critical data and systems |
Keywords | privileged access audit, insider threats, change management, security protocols, compliance, anomaly detection, multi-factor authentication, access control |
Field | Computer > Data / Information |
Published In | Volume 6, Issue 2, March-April 2024 |
Published On | 2024-03-27 |
Cite This | Privileged User Access Audits Techniques for Identifying and Mitigating Insider Threats - Shiksha Rout - IJFMR Volume 6, Issue 2, March-April 2024. |
Share this
E-ISSN 2582-2160
doi
CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
10.36948/ijfmr
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.