Insider attack and cyber security beyond the hacker

The insider attack problem nature and scopeReflections on the insider threat -- The "big picture" of insider IT sabotage across U.S. critical infrastructures -- Data theft : a prototypical insider threat -- A survey of insider attack detection research -- Naive Bayes as a masquerade detect...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Stolfo, Salvatore J. (HerausgeberIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: New York, NY Springer 2008
Schriftenreihe:Advances in information security 39
Schlagworte:
Online Zugang:Verlagsangaben
Kapitel 2
Cover
Inhaltsverzeichnis
Einführung/Vorwort
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The insider attack problem nature and scopeReflections on the insider threat -- The "big picture" of insider IT sabotage across U.S. critical infrastructures -- Data theft : a prototypical insider threat -- A survey of insider attack detection research -- Naive Bayes as a masquerade detector : addressing a chronic failure -- Towards a virtualization-enabled framework for information traceability (VFIT) -- Reconfigurable tamper-resistant hardware support against insider threats : the trusted ILLIAC approach -- Surviving insider attacks : a call for system experiments -- Preventative directions for insider threat mitigation via access control -- Taking stock and looking forward: an outsider's perspective on the insider threat -- Research challenges for fighting insider threat in the financial services industry -- Hard problems and research challenges concluding remarks.
The insider attack problem nature and scope -- Reflections on the insider threat -- The "big picture" of insider IT sabotage across U.S. critical infrastructures -- Data theft : a prototypical insider threat -- A survey of insider attack detection research -- Naive Bayes as a masquerade detector : addressing a chronic failure -- Towards a virtualization-enabled framework for information traceability (VFIT) -- Reconfigurable tamper-resistant hardware support against insider threats : the trusted ILLIAC approach -- Surviving insider attacks : a call for system experiments -- Preventative directions for insider threat mitigation via access control -- Taking stock and looking forward: an outsider's perspective on the insider threat -- Research challenges for fighting insider threat in the financial services industry -- Hard problems and research challenges concluding remarks.
Beschreibung:XI, 222 S.
Ill., graph. Darst.
235 mm x 155 mm
ISBN:9780387773216
978-0-387-77321-6
0387773215
0-387-77321-5