Cargando…

Insider threat : a guide to understanding, detecting, and defending against the enemy from within /

Detailing the measures that organizations can implement to ensure high-impact quick wins, this in-depth book looks beyond perimeter protection tools, and shows how a security culture based on international best practice can help mitigate the insider threat to your security. --

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Mehan, Julie E. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2016.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ii 4500
001 JSTOR_ocn965929257
003 OCoLC
005 20231005004200.0
006 m o d
007 cr cnu---unuuu
008 161214s2016 enk ob 000 0 eng d
040 |a JSTOR  |b eng  |e rda  |e pn  |c JSTOR  |d YDX  |d OCLCF  |d TEFOD  |d EBLCP  |d COO  |d MERUC  |d UAB  |d K6U  |d OTZ  |d LIV  |d OCLCQ  |d IOG  |d REB  |d VT2  |d D6H  |d N$T  |d AGLDB  |d IGB  |d SNK  |d INTCL  |d MHW  |d BTN  |d AUW  |d VVB  |d OCLCQ  |d VTS  |d UOK  |d WYU  |d G3B  |d LVT  |d S8I  |d S8J  |d S9I  |d C6I  |d STF  |d UKAHL  |d OCLCQ  |d BRF  |d UX1  |d OCLCO  |d INARC  |d OCLCQ  |d OCLCO 
019 |a 966257885  |a 966794849  |a 1175625761 
020 |a 9781849288408  |q (electronic bk.) 
020 |a 1849288402  |q (electronic bk.) 
020 |z 1849288399 
020 |z 9781849288392 
020 |z 9781849288415 
020 |z 1849288410 
029 1 |a AU@  |b 000060338616 
035 |a (OCoLC)965929257  |z (OCoLC)966257885  |z (OCoLC)966794849  |z (OCoLC)1175625761 
037 |a 22573/ctt1cdqhpd  |b JSTOR 
037 |a 912FE301-825D-4914-A9F6-C5DB96EFFAF2  |b OverDrive, Inc.  |n http://www.overdrive.com 
043 |a n-us--- 
050 4 |a UA23  |b .M45 2016eb 
072 7 |a POL  |x 017000  |2 bisacsh 
082 0 4 |a 352.3/79  |2 23 
049 |a UAMI 
100 1 |a Mehan, Julie E.,  |e author. 
245 1 0 |a Insider threat :  |b a guide to understanding, detecting, and defending against the enemy from within /  |c Dr. Julie E. Mehan. 
264 1 |a Ely, Cambridgeshire, United Kingdom :  |b IT Governance Publishing,  |c 2016. 
300 |a 1 online resource (301 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references. 
588 0 |a Print version record. 
520 |a Detailing the measures that organizations can implement to ensure high-impact quick wins, this in-depth book looks beyond perimeter protection tools, and shows how a security culture based on international best practice can help mitigate the insider threat to your security. --  |c Edited summary from book. 
505 0 |a Cover -- Title -- Copyright -- Preface -- About the Author -- Acknowledgements -- Contents -- Introduction -- Chapter 1: The Hidden Threat -- Why The Insider Threat is Called 'The Hidden Threat' -- Defining the Insider -- Insider Threat Has Many Forms -- Chapter 2: Insider Threat Models and Indicators -- The Bricks and Mortar Insider -- Hard Copy-Based Insider -- The Transitional Insider -- Bits and Bytes Insider -- Behavior Traits and Patterns Associated with Insider Threat -- Insider Motivations and Enablers -- The Psychology of an Insider -- The Snowden Case -- Organizational Characteristics and Insider Threat -- The Life Stages of the Insider Threat -- The Radicalized Insider Threat -- A Note of Caution -- Privacy and Ethical Concerns -- Chapter 3: The Unintentional Insider Threat -- Social Engineering -- The Careless UIT -- Social Media and the UIT -- Chapter 4: Insider Threat, Big Data and the Cloud -- Cloud Computing -- Big Data -- Cloud Computing & Big Data Insider Threat Concerns -- FedRAMP -- US Efforts to Secure the Cloud against Insider Threat -- Chapter 5: Regional Perspectives on Insider Threat -- Regional Perspectives -- Different Views on Insider Threat -- Chapter 6: Best Practices, Controls and Quick Wins -- Policy and Strategic Initiatives -- Training and Awareness -- Personnel Security and Management -- Prevention and Deterrence -- Reaction, Response, and Recovery -- Insider Threat 'Worst Practices' -- Chapter 7: Final Thoughts -- End Notes -- ITG Resources. 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
590 |a JSTOR  |b Books at JSTOR All Purchased 
650 0 |a Internal security  |z United States. 
650 0 |a National security  |z United States. 
650 7 |a POLITICAL SCIENCE / Public Affairs & Administration  |2 bisacsh 
650 7 |a Internal security  |2 fast 
650 7 |a National security  |2 fast 
651 7 |a United States  |2 fast 
776 0 8 |i Print version:  |a Mehan, Julie.  |t Insider threat.  |d [Place of publication not identified] : It Governance Pub, 2016  |z 1849288399  |w (OCoLC)952547591 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctt1cd0mjc  |z Texto completo 
938 |a Internet Archive  |b INAR  |n insiderthreatgui0000meha 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36161763 
938 |a Askews and Holts Library Services  |b ASKH  |n AH32139724 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4794154 
938 |a YBP Library Services  |b YANK  |n 13298822 
938 |a EBSCOhost  |b EBSC  |n 1437066 
994 |a 92  |b IZTAP