Insider Attack and Cyber Security Beyond the Hacker /
Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of the insider attack problem as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Computer Sc...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York, NY :
Springer US : Imprint: Springer,
2008.
|
Edición: | 1st ed. 2008. |
Colección: | Advances in Information Security,
39 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- The Insider Attack Problem Nature and Scope
- Reflections on the Insider Threat
- The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures
- Data Theft: A Prototypical Insider Threat
- A Survey of Insider Attack Detection Research
- Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure
- Towards a Virtualization-enabled Framework for Information Traceability (VFIT)
- Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach
- Surviving Insider Attacks: A Call for System Experiments
- Preventative Directions For Insider Threat Mitigation Via Access Control
- Taking Stock and Looking Forward - An Outsider's Perspective on the Insider Threat
- Hard Problems and Research Challenges
- Hard Problems and Research Challenges Concluding Remarks.