Home Forums Kamanja Forums Use Cases & Samples Personnel-centric Threats

This topic contains 0 replies, has 1 voice, and was last updated by  JP Creedon 1 year, 11 months ago.

  • Author
  • #17267 Reply

    JP Creedon

    Kamanja could be used to process e-mails, phone calls (transcribed) and access logs, identifying the relationships between access, e-mails and phone calls to identify potential insider trading, improper information sharing or confidentiality breaches.

    This would require models to process the level 1 information (time, date, sender, recipient, length etc.) and level 2 information (textual content, attachments etc.).

Reply To: Personnel-centric Threats
Your information: