×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

The Role of Access Control in Preventing Data Loss During Anomalous Insider Attacks

Abstract

The Role of Access Control in Preventing Data Loss During Anomalous Insider Attacks

Vanyushina A.V.

Incoming article date: 12.01.2026

The article examines the characteristics of insider threats, analyzes typical insider motivations, and identifies the main technical vectors used to carry out attacks, including unauthorized data copying, the use of cloud services, instant messengers, and remote access mechanisms. Particular attention is paid to the role of access control systems in preventing personal data leaks, as well as to contemporary scientific and practical approaches to countering insider activity. It is demonstrated that effective minimization of the risks associated with insider incidents is achievable only through a comprehensive combination of organizational, technical, and legal measures, along with systematic enhancement of personnel awareness in the field of information security.

Keywords: insider threats, personal data leakage, access control, dynamic access control, behavioral analysis