Summary of discussions at a planning meeting on cyber-security and the insider threat to classified information /
OF DISCUSSIONS AT A PLANNING MEETING ON CYBER-SECURITY AND THE INSIDER THREAT TO CLASSIFIED INFORMATION -- 1. INTRODUCTION -- 2. HIGH-GRADE THREATS AND HIGH-VALUE TARGETS -- 3. PSYCHOLOGICAL, SOCIAL, LEGAL AND MANAGERIAL ASPECTS OF THE INSIDER THREAT -- Differing Categories of and Motivations for In...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Washington, D.C. :
National Academies Press,
2000.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- SUMMARY OF DISCUSSIONS AT A PLANNING MEETING ON CYBER-SECURITY AND THE INSIDER THREAT TO CLASSIFIED INFORMATION
- 1. INTRODUCTION
- 2. HIGH-GRADE THREATS AND HIGH-VALUE TARGETS
- 3. PSYCHOLOGICAL, SOCIAL, LEGAL AND MANAGERIAL ASPECTS OF THE INSIDER THREAT
- Differing Categories of and Motivations for Insiders
- Need for Data and Modeling Techniques
- Management Issues
- Legal Issues
- 4. TECHNOLOGY, PRESENT AND FUTURE
- Technologies in Use and Their Limitations
- Emerging Tools
- 5. OPTIONS FOR CSTB
- NEXT STEPS
- APPENDIX A ON THE NATIONAL ACADEMIESAPPENDIX B PLANNING MEETING ON CYBER-SECURITY AND THE INSIDER THREAT TO CLASSIFIEDINFORMATION-NOVEMBER 1�2, 2000LIST OF�
- APPENDIX C MEETING AGENDA