The insider threat combatting the enemy within

The insider threat poses a significant and increasing problem for organisations. The use of highly connected computers makes controlling information much more difficult than in the past. This new pocket guide intends to shed light on the key security issues facing organisations from insiders to get...

Descripción completa

Detalles Bibliográficos
Autor principal: Blackwell, Clive (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Ely, U.K. : IT Governance Pub 2009.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627491306719
Tabla de Contenidos:
  • Preliminaries; CONTENTS; Chapter 1 Modelling the Insider Threat; What is the insider threat; Architectural security model; An attack classification scheme; Attack surface; Impact zone; System hardening; Targeting the attacker; Chapter 2 Insider Attacks; Insider attack classification; Damage; Defensive protection; Fraud; Theft; Conclusions; Appendix Further Reading; ITG Resources