Individuals with authorized access to organizational networks or resources who potentially exploit vulnerabilities to compromise security or steal data.
Related Terms
ISO 27001
This international standard, first published in 2005 and revised in 2013, outlines best practices fo...
HIPAA
Signed into law in 1996, the Health Insurance Portability and Accountability Act (HIPAA) governs the...