DiscoverComputing and Information TechnologyInsider Misuse Identification - Applying Transparent Biometrics
Insider Misuse Identification - Applying Transparent Biometrics

Insider Misuse Identification - Applying Transparent Biometrics

Update: 2017-05-11
Share

Description

Nathan Clarke describes two approaches to utilising transparent biometrics for investigating and attributing insider misuse: a proactive approach that embeds biometrics within digital objects (to identify and attribute the source of any stolen information); and a reactive measure that seeks to identify users from network meta-data.

The talk was part of the panel session at the 16th Annual Security Conference, held in Las Vegas from 18-20 April 2017. [(CC) BY-NC-SA 2.0 UK]
Comments 
loading
00:00
00:00
1.0x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Insider Misuse Identification - Applying Transparent Biometrics

Insider Misuse Identification - Applying Transparent Biometrics

Steven Furnell