The insider threat combatting the enemy within
The insider threat poses a significant and increasing problem for organisations. The use of highly connected computers makes controlling information much more difficult than in the past. This new pocket guide intends to shed light on the key security issues facing organisations from insiders to get...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Ely, U.K. :
IT Governance Pub
2009.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627491306719 |
Tabla de Contenidos:
- Preliminaries; CONTENTS; Chapter 1 Modelling the Insider Threat; What is the insider threat; Architectural security model; An attack classification scheme; Attack surface; Impact zone; System hardening; Targeting the attacker; Chapter 2 Insider Attacks; Insider attack classification; Damage; Defensive protection; Fraud; Theft; Conclusions; Appendix Further Reading; ITG Resources