Cargando…

Summary of discussions at a planning meeting on cyber-security and the insider threat to classified information /

OF DISCUSSIONS AT A PLANNING MEETING ON CYBER-SECURITY AND THE INSIDER THREAT TO CLASSIFIED INFORMATION -- 1. INTRODUCTION -- 2. HIGH-GRADE THREATS AND HIGH-VALUE TARGETS -- 3. PSYCHOLOGICAL, SOCIAL, LEGAL AND MANAGERIAL ASPECTS OF THE INSIDER THREAT -- Differing Categories of and Motivations for In...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: National Research Council (U.S.). Computer Science and Telecommunications Board
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Washington, D.C. : National Academies Press, 2000.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 EBSCO_ocn144618603
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 050324s2000 dcu o 000 0 eng d
040 |a COCUF  |b eng  |e pn  |c COCUF  |d OCLCQ  |d N$T  |d YDXCP  |d OCLCQ  |d DKDLA  |d MERUC  |d CCO  |d E7B  |d OCLCQ  |d FVL  |d OCLCQ  |d TFW  |d OCLCQ  |d OCLCF  |d OCLCQ  |d EBLCP  |d OCLCQ  |d AGLDB  |d MOR  |d PIFBR  |d ZCU  |d OCLCQ  |d U3W  |d OCLCA  |d BUF  |d STF  |d OCLCQ  |d VTS  |d COCUF  |d ICG  |d AU@  |d OCLCQ  |d WYU  |d LVT  |d TKN  |d G3B  |d DKC  |d OCLCQ  |d K6U  |d OCLCQ  |d OCLCO  |d AAU  |d OCLCQ 
019 |a 58596250  |a 481900855  |a 488738662  |a 560258042  |a 646728111  |a 722334230  |a 728012273  |a 923271799 
020 |a 0309580226  |q (electronic bk.) 
020 |a 9780309580229  |q (electronic bk.) 
029 1 |a AU@  |b 000025090378 
029 1 |a AU@  |b 000050983464 
029 1 |a DEBBG  |b BV043140895 
029 1 |a DEBBG  |b BV044108193 
029 1 |a DEBSZ  |b 422347914 
029 1 |a GBVCP  |b 802298524 
029 1 |a NZ1  |b 12047050 
035 |a (OCoLC)144618603  |z (OCoLC)58596250  |z (OCoLC)481900855  |z (OCoLC)488738662  |z (OCoLC)560258042  |z (OCoLC)646728111  |z (OCoLC)722334230  |z (OCoLC)728012273  |z (OCoLC)923271799 
037 |b 00017961 
043 |a n-us--- 
050 4 |a QA76.9.A25  |b S86 2000eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a Summary of discussions at a planning meeting on cyber-security and the insider threat to classified information /  |c Computer Science and Telecommunications Board. 
260 |a Washington, D.C. :  |b National Academies Press,  |c 2000. 
300 |a 1 online resource (16 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a SUMMARY OF DISCUSSIONS AT A PLANNING MEETING ON CYBER-SECURITY AND THE INSIDER THREAT TO CLASSIFIED INFORMATION -- 1. INTRODUCTION -- 2. HIGH-GRADE THREATS AND HIGH-VALUE TARGETS -- 3. PSYCHOLOGICAL, SOCIAL, LEGAL AND MANAGERIAL ASPECTS OF THE INSIDER THREAT -- Differing Categories of and Motivations for Insiders -- Need for Data and Modeling Techniques -- Management Issues -- Legal Issues -- 4. TECHNOLOGY, PRESENT AND FUTURE -- Technologies in Use and Their Limitations -- Emerging Tools -- 5. OPTIONS FOR CSTB -- NEXT STEPS 
505 8 |a APPENDIX A ON THE NATIONAL ACADEMIESAPPENDIX B PLANNING MEETING ON CYBER-SECURITY AND THE INSIDER THREAT TO CLASSIFIEDINFORMATION-NOVEMBER 1â€?2, 2000LIST OFâ€? -- APPENDIX C MEETING AGENDA 
520 |a OF DISCUSSIONS AT A PLANNING MEETING ON CYBER-SECURITY AND THE INSIDER THREAT TO CLASSIFIED INFORMATION -- 1. INTRODUCTION -- 2. HIGH-GRADE THREATS AND HIGH-VALUE TARGETS -- 3. PSYCHOLOGICAL, SOCIAL, LEGAL AND MANAGERIAL ASPECTS OF THE INSIDER THREAT -- Differing Categories of and Motivations for Insiders -- Need for Data and Modeling Techniques -- Management Issues -- Legal Issues -- 4. TECHNOLOGY, PRESENT AND FUTURE -- Technologies in Use and Their Limitations -- Emerging Tools -- 5. OPTIONS FOR CSTB -- NEXT STEPS: -- APPENDIX A ON THE NATIONAL ACADEMIES. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security. 
650 0 |a Information warfare. 
650 6 |a Sécurité informatique. 
650 6 |a Guerre de l'information. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Information warfare.  |2 fast  |0 (OCoLC)fst00973186 
710 2 |a National Research Council (U.S.).  |b Computer Science and Telecommunications Board. 
776 0 8 |i Print version:  |a Council, National Research.  |t Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information.  |d Washington : National Academies Press, ©1900 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=123514  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL3377658 
938 |a ebrary  |b EBRY  |n ebr10071977 
938 |a EBSCOhost  |b EBSC  |n 123514 
938 |a YBP Library Services  |b YANK  |n 2293969 
994 |a 92  |b IZTAP