Cargando…

Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures /

Packed with vivid real-life cases, this comprehensive book addresses the most difficult to manage and costly of all security threats: the insider.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Contos, Brian T.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, Mass. : Syngress, ©2006.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn183748860
003 OCoLC
005 20231017213018.0
006 m o d
007 cr zn|||||||||
008 071213s2006 maua ob 001 0 eng d
040 |a NTG  |b eng  |e pn  |c NTG  |d N$T  |d YDXCP  |d ZCU  |d IDEBK  |d E7B  |d OCLCQ  |d UMI  |d CEF  |d OCLCQ  |d U5D  |d AU@  |d OCLCQ  |d B24X7  |d DEBSZ  |d EBLCP  |d OCLCQ  |d OCLCF  |d OCLCQ  |d OCLCA  |d OCLCQ  |d OPELS  |d OCL  |d OCLCQ  |d COO  |d OCLCQ  |d LOA  |d JBG  |d AGLDB  |d STF  |d MOR  |d PIFAG  |d LIV  |d MERUC  |d OCLCQ  |d U3W  |d OCLCA  |d EZC  |d WRM  |d D6H  |d OCLCQ  |d VTS  |d ICG  |d INT  |d VT2  |d OCLCQ  |d UAB  |d LEAUB  |d DKC  |d OCLCQ  |d M8D  |d OL$  |d OCLCQ  |d BRF  |d OCLCQ  |d MHW  |d OCLCO  |d OCLCQ 
019 |a 154201232  |a 162131551  |a 269472059  |a 314139390  |a 354787694  |a 488430786  |a 507060916  |a 606033163  |a 648300538  |a 722902294  |a 961620062  |a 962623138  |a 966248222  |a 984786344  |a 988501411  |a 992029365  |a 1034913437  |a 1037710788  |a 1038698134  |a 1044158120  |a 1055317340  |a 1056399276  |a 1060860517  |a 1074323472 
020 |a 1597491292 
020 |a 9781597491297 
020 |a 9780080477602  |q (electronic bk.) 
020 |a 0080477607  |q (electronic bk.) 
024 1 |a 792502912928 
029 1 |a AU@  |b 000043380322 
029 1 |a AU@  |b 000052942929 
029 1 |a CHBIS  |b 005829131 
029 1 |a CHNEW  |b 001007370 
029 1 |a CHVBK  |b 168606763 
029 1 |a DEBBG  |b BV039828855 
029 1 |a DEBBG  |b BV042314243 
029 1 |a DEBBG  |b BV043043887 
029 1 |a DEBBG  |b BV044124154 
029 1 |a DEBSZ  |b 355443481 
029 1 |a DEBSZ  |b 405305869 
029 1 |a DEBSZ  |b 422198692 
029 1 |a DEBSZ  |b 430397143 
029 1 |a GBVCP  |b 802402364 
029 1 |a HEBIS  |b 291513786 
029 1 |a NZ1  |b 11778358 
029 1 |a NZ1  |b 14540272 
029 1 |a NZ1  |b 15189226 
035 |a (OCoLC)183748860  |z (OCoLC)154201232  |z (OCoLC)162131551  |z (OCoLC)269472059  |z (OCoLC)314139390  |z (OCoLC)354787694  |z (OCoLC)488430786  |z (OCoLC)507060916  |z (OCoLC)606033163  |z (OCoLC)648300538  |z (OCoLC)722902294  |z (OCoLC)961620062  |z (OCoLC)962623138  |z (OCoLC)966248222  |z (OCoLC)984786344  |z (OCoLC)988501411  |z (OCoLC)992029365  |z (OCoLC)1034913437  |z (OCoLC)1037710788  |z (OCoLC)1038698134  |z (OCoLC)1044158120  |z (OCoLC)1055317340  |z (OCoLC)1056399276  |z (OCoLC)1060860517  |z (OCoLC)1074323472 
037 |b 00991439 
050 4 |a TK5105.59  |b .C658 2006eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Contos, Brian T. 
245 1 0 |a Enemy at the water cooler :  |b real-life stories of insider threats and Enterprise Security Management countermeasures /  |c Brian T. Contos. 
260 |a Rockland, Mass. :  |b Syngress,  |c ©2006. 
300 |a 1 online resource (xxii, 262 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Title from Web page (viewed February 28, 2007). 
520 |a Packed with vivid real-life cases, this comprehensive book addresses the most difficult to manage and costly of all security threats: the insider. 
504 |a Includes bibliographical references and index. 
505 0 |a Part I: Background on Cyber Crime, Insider Threats, and ESM -- Chapter One: Cyber Crime and Cyber Criminals -- About this Chapter -- Computer Dependence and Internet Growth -- The Shrinking Vulnerability Threat Window -- Motivations for Cyber Criminal Activity -- o Black Markets -- Hacker -- Script Kiddies -- Solitary Cyber Criminals and Exploit Writers for Hire -- Organized Crime -- Identity Thieves (Impersonation Fraudsters) -- Competitors -- Activist Groups, Nation-State Threats, and Terrorists -- Activists -- Nation-State Threats -- o China -- o France -- o Russia -- o United Kingdom -- o United States -- Terrorists -- Insiders -- Tools of the Trade -- o Application-Layer Exploits -- o Botnets -- o Buffer Overflows -- o Code Packing -- o Denial-of-service (DoS) Attacks -- o More Aggressive and Sophisticated Malware -- o Non-wired Attacks and Mobile Devices -- o Password-cracking -- o Phishing -- o Reconnaissance and Googledorks -- o Rootkits and Keyloggers -- o Social Engineering Attacks -- o Voice over IP (VoIP) Attacks -- o Zero-Day Exploits -- Summary Points -- Chapter Two: Insider Threats -- Understanding Who the Insider Is -- Psychology of Insider Identification -- Insider Threat Examples from the Media -- Insider Threats from a Human Perspective -- o A Word on Policies -- Insider Threats from a Business Perspective -- o Risk -- Insider Threats from a Technical Perspective -- o Need-to-know -- o Least Privileges -- o Separation of Duties -- o Strong Authentication -- o Access Controls -- o Incident Detection and Incident Management -- Summary Points -- -- Chapter Three: Enterprise Security Management (ESM) -- ESM in a Nutshell -- Key ESM Feature Requirements -- o Event Collection -- o Normalization -- o Categorization -- o Asset Information -- o Vulnerability Information -- o Zoning and Global Positioning System Data -- o Active Lists -- o Actors -- o Data Content -- o Correlation -- o Prioritization -- o Event and Response Time Reduction -- o Anomaly Detection -- o Pattern Discovery -- o Alerting -- o Case Management -- o Real-Time Analysis and Forensic Investigation -- o Visualization -- o High-level Dashboards -- o Detailed Visualization -- o Reporting -- o Remediation -- Return On Investment (ROI) and Return On Security Investment (ROSI) -- Alternatives to ESM -- o Do Nothing -- o Custom In-house Solutions -- o Outsourcing and Co-sourcing --? Co-sourcing examples: -- Summary Points -- -- Part II: Real Life Case Studies -- Chapter Four: Imbalanced SecurityA Singaporean Data Center -- Chapter Five: Correlating Physical and Logical Security EventsA U.S. Government Organization -- Chapter Six: Insider with a ConscienceAn Austrian Retailer -- Chapter Seven: Collaborative ThreatA Telecommunications Company in the U.S. -- Chapter Eight: Outbreak from WithinA Financial Organization in the U.K. -- Chapter Nine: Mixing Revenge and PasswordsA Utility Company in Brazil -- Chapter Ten: Rapid RemediationA University in the United States -- Chapter Eleven: Suspicious ActivityA Consulting Company in Spain -- Chapter Twelve: Insiders Abridged -- Malicious use of Medical Records -- Hosting Pirated Software -- Pod-Slurping -- Auctioning State Property -- Writing Code for another Company -- Outsourced Insiders -- Smuggling Gold in Rattus Norvegicus -- -- Part III: The Extensibility of ESM -- Chapter Thirteen: Establishing Chain-of-Custody Best Practices with ESM -- Disclaimer -- Monitoring and disclosure -- Provider Protection Exception -- Consent Exception -- Computer Trespasser Exception -- Court Order Exception -- Best Practices -- Canadian Best Evidence Rule -- Summary Points -- -- Chapter Fourteen: Addressing Both Insider Threats and Sarbanes-Oxley with ESM -- A Primer on Sarbanes-Oxley -- Section 302: Corporate Responsibility for Financial Reports -- Section 404: Management Assessment of Internal Controls -- Separation of Duties -- Monitoring Interaction with Financial Processes -- Detecting Changes in Controls over Financial Systems -- Section 409: Real-time Issuer Disclosures -- Summary Points -- -- Chapter Fifteen: Incident Management with ESM -- Incident Management Basics -- Improved Risk Management -- Improved Compliance -- Reduced Costs -- Current Challenges -- o Process -- o Organization -- o Technology -- Building an Incident Management Program -- o Defining Risk -- Five Steps to Risk Definition for Incident Management -- o Process -- o Training -- o Stakeholder Involvement -- o Remediation -- o Documentation -- Reporting and Metrics -- Summary Points -- -- Chapter Sixteen: Insider Threat Questions and Answers -- Introduction -- Insider Threat Recap -- Question One -- Employees -- o The Hiring Process -- o Reviews -- o Awareness -- o NIST 800-50 -- o Policies -- o Standards -- o Security Memorandum Example -- Question Two -- Prevention -- Question Three Asset Inventories -- Question Four Log Collection -- o Security Application Logs -- o Operating System Log -- o Web Server Logs -- o NIST 800-92 -- Question Five Log Analysis -- Question Six -- Specialized Insider Content -- Question Seven Physical and Logical Security Convergence -- Question Eight IT Governance -- o NIST 800-53 -- o Network Account Deletion maps to NIST 800-53 section AC-2 -- o Vulnerability Scanning maps to NIST 800-53 section RA-5 -- o Asset Creation maps to NIST 800-53 section CM-4 -- o Attacks and Suspicious Activity from Public Facing Assets maps to NIST 800-53 section SC-14 -- o Traffic from Internal to External Assets maps to NIST 800-53 section SC-7 -- Question Nine -- Incident Response -- Question 10 Must Haves -- -- Appendix AExamples of Cyber Crime Prosecutions. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Hackers. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Pirates informatiques. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 blmlsh 
650 7 |a Computer security.  |2 blmlsh 
650 7 |a Computer hackers.  |2 blmlsh 
650 7 |a Hackers.  |2 fast  |0 (OCoLC)fst00872150 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
776 0 8 |i Print version:  |a Contos, Brian T.  |t Enemy at the water cooler.  |d Rockland, MA : Syngress, ©2006  |z 1597491292  |z 9781597491297  |w (OCoLC)71843890 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597491297/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00013585 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL294116 
938 |a ebrary  |b EBRY  |n ebr10186105 
938 |a EBSCOhost  |b EBSC  |n 196374 
938 |a YBP Library Services  |b YANK  |n 2586072 
994 |a 92  |b IZTAP