Insider attack and cyber security beyond the hacker
The insider attack problem nature and scopeReflections on the insider threat -- The "big picture" of insider IT sabotage across U.S. critical infrastructures -- Data theft : a prototypical insider threat -- A survey of insider attack detection research -- Naive Bayes as a masquerade detect...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | UnknownFormat |
Sprache: | eng |
Veröffentlicht: |
New York, NY
Springer
2008
|
Schriftenreihe: | Advances in information security
39 |
Schlagworte: | |
Online Zugang: | Verlagsangaben Kapitel 2 Cover Inhaltsverzeichnis Einführung/Vorwort |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The insider attack problem nature and scopeReflections on the insider threat -- The "big picture" of insider IT sabotage across U.S. critical infrastructures -- Data theft : a prototypical insider threat -- A survey of insider attack detection research -- Naive Bayes as a masquerade detector : addressing a chronic failure -- Towards a virtualization-enabled framework for information traceability (VFIT) -- Reconfigurable tamper-resistant hardware support against insider threats : the trusted ILLIAC approach -- Surviving insider attacks : a call for system experiments -- Preventative directions for insider threat mitigation via access control -- Taking stock and looking forward: an outsider's perspective on the insider threat -- Research challenges for fighting insider threat in the financial services industry -- Hard problems and research challenges concluding remarks. The insider attack problem nature and scope -- Reflections on the insider threat -- The "big picture" of insider IT sabotage across U.S. critical infrastructures -- Data theft : a prototypical insider threat -- A survey of insider attack detection research -- Naive Bayes as a masquerade detector : addressing a chronic failure -- Towards a virtualization-enabled framework for information traceability (VFIT) -- Reconfigurable tamper-resistant hardware support against insider threats : the trusted ILLIAC approach -- Surviving insider attacks : a call for system experiments -- Preventative directions for insider threat mitigation via access control -- Taking stock and looking forward: an outsider's perspective on the insider threat -- Research challenges for fighting insider threat in the financial services industry -- Hard problems and research challenges concluding remarks. |
---|---|
Beschreibung: | XI, 222 S. Ill., graph. Darst. 235 mm x 155 mm |
ISBN: | 9780387773216 978-0-387-77321-6 0387773215 0-387-77321-5 |