Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures /
Packed with vivid real-life cases, this comprehensive book addresses the most difficult to manage and costly of all security threats: the insider.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Rockland, Mass. :
Syngress,
©2006.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn183748860 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr zn||||||||| | ||
008 | 071213s2006 maua ob 001 0 eng d | ||
040 | |a NTG |b eng |e pn |c NTG |d N$T |d YDXCP |d ZCU |d IDEBK |d E7B |d OCLCQ |d UMI |d CEF |d OCLCQ |d U5D |d AU@ |d OCLCQ |d B24X7 |d DEBSZ |d EBLCP |d OCLCQ |d OCLCF |d OCLCQ |d OCLCA |d OCLCQ |d OPELS |d OCL |d OCLCQ |d COO |d OCLCQ |d LOA |d JBG |d AGLDB |d STF |d MOR |d PIFAG |d LIV |d MERUC |d OCLCQ |d U3W |d OCLCA |d EZC |d WRM |d D6H |d OCLCQ |d VTS |d ICG |d INT |d VT2 |d OCLCQ |d UAB |d LEAUB |d DKC |d OCLCQ |d M8D |d OL$ |d OCLCQ |d BRF |d OCLCQ |d MHW |d OCLCO |d OCLCQ |d OCLCO | ||
019 | |a 154201232 |a 162131551 |a 269472059 |a 314139390 |a 354787694 |a 488430786 |a 507060916 |a 606033163 |a 648300538 |a 722902294 |a 961620062 |a 962623138 |a 966248222 |a 984786344 |a 988501411 |a 992029365 |a 1034913437 |a 1037710788 |a 1038698134 |a 1044158120 |a 1055317340 |a 1056399276 |a 1060860517 |a 1074323472 | ||
020 | |a 1597491292 | ||
020 | |a 9781597491297 | ||
020 | |a 9780080477602 |q (electronic bk.) | ||
020 | |a 0080477607 |q (electronic bk.) | ||
024 | 1 | |a 792502912928 | |
029 | 1 | |a AU@ |b 000043380322 | |
029 | 1 | |a AU@ |b 000052942929 | |
029 | 1 | |a CHBIS |b 005829131 | |
029 | 1 | |a CHNEW |b 001007370 | |
029 | 1 | |a CHVBK |b 168606763 | |
029 | 1 | |a DEBBG |b BV039828855 | |
029 | 1 | |a DEBBG |b BV042314243 | |
029 | 1 | |a DEBBG |b BV043043887 | |
029 | 1 | |a DEBBG |b BV044124154 | |
029 | 1 | |a DEBSZ |b 355443481 | |
029 | 1 | |a DEBSZ |b 405305869 | |
029 | 1 | |a DEBSZ |b 422198692 | |
029 | 1 | |a DEBSZ |b 430397143 | |
029 | 1 | |a GBVCP |b 802402364 | |
029 | 1 | |a HEBIS |b 291513786 | |
029 | 1 | |a NZ1 |b 11778358 | |
029 | 1 | |a NZ1 |b 14540272 | |
029 | 1 | |a NZ1 |b 15189226 | |
035 | |a (OCoLC)183748860 |z (OCoLC)154201232 |z (OCoLC)162131551 |z (OCoLC)269472059 |z (OCoLC)314139390 |z (OCoLC)354787694 |z (OCoLC)488430786 |z (OCoLC)507060916 |z (OCoLC)606033163 |z (OCoLC)648300538 |z (OCoLC)722902294 |z (OCoLC)961620062 |z (OCoLC)962623138 |z (OCoLC)966248222 |z (OCoLC)984786344 |z (OCoLC)988501411 |z (OCoLC)992029365 |z (OCoLC)1034913437 |z (OCoLC)1037710788 |z (OCoLC)1038698134 |z (OCoLC)1044158120 |z (OCoLC)1055317340 |z (OCoLC)1056399276 |z (OCoLC)1060860517 |z (OCoLC)1074323472 | ||
037 | |b 00991439 | ||
050 | 4 | |a TK5105.59 |b .C658 2006eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 22 |
049 | |a UAMI | ||
100 | 1 | |a Contos, Brian T. | |
245 | 1 | 0 | |a Enemy at the water cooler : |b real-life stories of insider threats and Enterprise Security Management countermeasures / |c Brian T. Contos. |
260 | |a Rockland, Mass. : |b Syngress, |c ©2006. | ||
300 | |a 1 online resource (xxii, 262 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a Title from Web page (viewed February 28, 2007). | ||
520 | |a Packed with vivid real-life cases, this comprehensive book addresses the most difficult to manage and costly of all security threats: the insider. | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Part I: Background on Cyber Crime, Insider Threats, and ESM -- Chapter One: Cyber Crime and Cyber Criminals -- About this Chapter -- Computer Dependence and Internet Growth -- The Shrinking Vulnerability Threat Window -- Motivations for Cyber Criminal Activity -- o Black Markets -- Hacker -- Script Kiddies -- Solitary Cyber Criminals and Exploit Writers for Hire -- Organized Crime -- Identity Thieves (Impersonation Fraudsters) -- Competitors -- Activist Groups, Nation-State Threats, and Terrorists -- Activists -- Nation-State Threats -- o China -- o France -- o Russia -- o United Kingdom -- o United States -- Terrorists -- Insiders -- Tools of the Trade -- o Application-Layer Exploits -- o Botnets -- o Buffer Overflows -- o Code Packing -- o Denial-of-service (DoS) Attacks -- o More Aggressive and Sophisticated Malware -- o Non-wired Attacks and Mobile Devices -- o Password-cracking -- o Phishing -- o Reconnaissance and Googledorks -- o Rootkits and Keyloggers -- o Social Engineering Attacks -- o Voice over IP (VoIP) Attacks -- o Zero-Day Exploits -- Summary Points -- Chapter Two: Insider Threats -- Understanding Who the Insider Is -- Psychology of Insider Identification -- Insider Threat Examples from the Media -- Insider Threats from a Human Perspective -- o A Word on Policies -- Insider Threats from a Business Perspective -- o Risk -- Insider Threats from a Technical Perspective -- o Need-to-know -- o Least Privileges -- o Separation of Duties -- o Strong Authentication -- o Access Controls -- o Incident Detection and Incident Management -- Summary Points -- -- Chapter Three: Enterprise Security Management (ESM) -- ESM in a Nutshell -- Key ESM Feature Requirements -- o Event Collection -- o Normalization -- o Categorization -- o Asset Information -- o Vulnerability Information -- o Zoning and Global Positioning System Data -- o Active Lists -- o Actors -- o Data Content -- o Correlation -- o Prioritization -- o Event and Response Time Reduction -- o Anomaly Detection -- o Pattern Discovery -- o Alerting -- o Case Management -- o Real-Time Analysis and Forensic Investigation -- o Visualization -- o High-level Dashboards -- o Detailed Visualization -- o Reporting -- o Remediation -- Return On Investment (ROI) and Return On Security Investment (ROSI) -- Alternatives to ESM -- o Do Nothing -- o Custom In-house Solutions -- o Outsourcing and Co-sourcing --? Co-sourcing examples: -- Summary Points -- -- Part II: Real Life Case Studies -- Chapter Four: Imbalanced SecurityA Singaporean Data Center -- Chapter Five: Correlating Physical and Logical Security EventsA U.S. Government Organization -- Chapter Six: Insider with a ConscienceAn Austrian Retailer -- Chapter Seven: Collaborative ThreatA Telecommunications Company in the U.S. -- Chapter Eight: Outbreak from WithinA Financial Organization in the U.K. -- Chapter Nine: Mixing Revenge and PasswordsA Utility Company in Brazil -- Chapter Ten: Rapid RemediationA University in the United States -- Chapter Eleven: Suspicious ActivityA Consulting Company in Spain -- Chapter Twelve: Insiders Abridged -- Malicious use of Medical Records -- Hosting Pirated Software -- Pod-Slurping -- Auctioning State Property -- Writing Code for another Company -- Outsourced Insiders -- Smuggling Gold in Rattus Norvegicus -- -- Part III: The Extensibility of ESM -- Chapter Thirteen: Establishing Chain-of-Custody Best Practices with ESM -- Disclaimer -- Monitoring and disclosure -- Provider Protection Exception -- Consent Exception -- Computer Trespasser Exception -- Court Order Exception -- Best Practices -- Canadian Best Evidence Rule -- Summary Points -- -- Chapter Fourteen: Addressing Both Insider Threats and Sarbanes-Oxley with ESM -- A Primer on Sarbanes-Oxley -- Section 302: Corporate Responsibility for Financial Reports -- Section 404: Management Assessment of Internal Controls -- Separation of Duties -- Monitoring Interaction with Financial Processes -- Detecting Changes in Controls over Financial Systems -- Section 409: Real-time Issuer Disclosures -- Summary Points -- -- Chapter Fifteen: Incident Management with ESM -- Incident Management Basics -- Improved Risk Management -- Improved Compliance -- Reduced Costs -- Current Challenges -- o Process -- o Organization -- o Technology -- Building an Incident Management Program -- o Defining Risk -- Five Steps to Risk Definition for Incident Management -- o Process -- o Training -- o Stakeholder Involvement -- o Remediation -- o Documentation -- Reporting and Metrics -- Summary Points -- -- Chapter Sixteen: Insider Threat Questions and Answers -- Introduction -- Insider Threat Recap -- Question One -- Employees -- o The Hiring Process -- o Reviews -- o Awareness -- o NIST 800-50 -- o Policies -- o Standards -- o Security Memorandum Example -- Question Two -- Prevention -- Question Three Asset Inventories -- Question Four Log Collection -- o Security Application Logs -- o Operating System Log -- o Web Server Logs -- o NIST 800-92 -- Question Five Log Analysis -- Question Six -- Specialized Insider Content -- Question Seven Physical and Logical Security Convergence -- Question Eight IT Governance -- o NIST 800-53 -- o Network Account Deletion maps to NIST 800-53 section AC-2 -- o Vulnerability Scanning maps to NIST 800-53 section RA-5 -- o Asset Creation maps to NIST 800-53 section CM-4 -- o Attacks and Suspicious Activity from Public Facing Assets maps to NIST 800-53 section SC-14 -- o Traffic from Internal to External Assets maps to NIST 800-53 section SC-7 -- Question Nine -- Incident Response -- Question 10 Must Haves -- -- Appendix AExamples of Cyber Crime Prosecutions. | |
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Hackers. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Pirates informatiques. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures. |2 blmlsh | |
650 | 7 | |a Computer security. |2 blmlsh | |
650 | 7 | |a Computer hackers. |2 blmlsh | |
650 | 7 | |a Hackers |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
776 | 0 | 8 | |i Print version: |a Contos, Brian T. |t Enemy at the water cooler. |d Rockland, MA : Syngress, ©2006 |z 1597491292 |z 9781597491297 |w (OCoLC)71843890 |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=294116 |z Texto completo |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781597491297/?ar |z Texto completo |
938 | |a Books 24x7 |b B247 |n bks00013585 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL294116 | ||
938 | |a ebrary |b EBRY |n ebr10186105 | ||
938 | |a EBSCOhost |b EBSC |n 196374 | ||
938 | |a YBP Library Services |b YANK |n 2586072 | ||
994 | |a 92 |b IZTAP |