|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn183748860 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr zn||||||||| |
008 |
071213s2006 maua ob 001 0 eng d |
040 |
|
|
|a NTG
|b eng
|e pn
|c NTG
|d N$T
|d YDXCP
|d ZCU
|d IDEBK
|d E7B
|d OCLCQ
|d UMI
|d CEF
|d OCLCQ
|d U5D
|d AU@
|d OCLCQ
|d B24X7
|d DEBSZ
|d EBLCP
|d OCLCQ
|d OCLCF
|d OCLCQ
|d OCLCA
|d OCLCQ
|d OPELS
|d OCL
|d OCLCQ
|d COO
|d OCLCQ
|d LOA
|d JBG
|d AGLDB
|d STF
|d MOR
|d PIFAG
|d LIV
|d MERUC
|d OCLCQ
|d U3W
|d OCLCA
|d EZC
|d WRM
|d D6H
|d OCLCQ
|d VTS
|d ICG
|d INT
|d VT2
|d OCLCQ
|d UAB
|d LEAUB
|d DKC
|d OCLCQ
|d M8D
|d OL$
|d OCLCQ
|d BRF
|d OCLCQ
|d MHW
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 154201232
|a 162131551
|a 269472059
|a 314139390
|a 354787694
|a 488430786
|a 507060916
|a 606033163
|a 648300538
|a 722902294
|a 961620062
|a 962623138
|a 966248222
|a 984786344
|a 988501411
|a 992029365
|a 1034913437
|a 1037710788
|a 1038698134
|a 1044158120
|a 1055317340
|a 1056399276
|a 1060860517
|a 1074323472
|
020 |
|
|
|a 1597491292
|
020 |
|
|
|a 9781597491297
|
020 |
|
|
|a 9780080477602
|q (electronic bk.)
|
020 |
|
|
|a 0080477607
|q (electronic bk.)
|
024 |
1 |
|
|a 792502912928
|
029 |
1 |
|
|a AU@
|b 000043380322
|
029 |
1 |
|
|a AU@
|b 000052942929
|
029 |
1 |
|
|a CHBIS
|b 005829131
|
029 |
1 |
|
|a CHNEW
|b 001007370
|
029 |
1 |
|
|a CHVBK
|b 168606763
|
029 |
1 |
|
|a DEBBG
|b BV039828855
|
029 |
1 |
|
|a DEBBG
|b BV042314243
|
029 |
1 |
|
|a DEBBG
|b BV043043887
|
029 |
1 |
|
|a DEBBG
|b BV044124154
|
029 |
1 |
|
|a DEBSZ
|b 355443481
|
029 |
1 |
|
|a DEBSZ
|b 405305869
|
029 |
1 |
|
|a DEBSZ
|b 422198692
|
029 |
1 |
|
|a DEBSZ
|b 430397143
|
029 |
1 |
|
|a GBVCP
|b 802402364
|
029 |
1 |
|
|a HEBIS
|b 291513786
|
029 |
1 |
|
|a NZ1
|b 11778358
|
029 |
1 |
|
|a NZ1
|b 14540272
|
029 |
1 |
|
|a NZ1
|b 15189226
|
035 |
|
|
|a (OCoLC)183748860
|z (OCoLC)154201232
|z (OCoLC)162131551
|z (OCoLC)269472059
|z (OCoLC)314139390
|z (OCoLC)354787694
|z (OCoLC)488430786
|z (OCoLC)507060916
|z (OCoLC)606033163
|z (OCoLC)648300538
|z (OCoLC)722902294
|z (OCoLC)961620062
|z (OCoLC)962623138
|z (OCoLC)966248222
|z (OCoLC)984786344
|z (OCoLC)988501411
|z (OCoLC)992029365
|z (OCoLC)1034913437
|z (OCoLC)1037710788
|z (OCoLC)1038698134
|z (OCoLC)1044158120
|z (OCoLC)1055317340
|z (OCoLC)1056399276
|z (OCoLC)1060860517
|z (OCoLC)1074323472
|
037 |
|
|
|b 00991439
|
050 |
|
4 |
|a TK5105.59
|b .C658 2006eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Contos, Brian T.
|
245 |
1 |
0 |
|a Enemy at the water cooler :
|b real-life stories of insider threats and Enterprise Security Management countermeasures /
|c Brian T. Contos.
|
260 |
|
|
|a Rockland, Mass. :
|b Syngress,
|c ©2006.
|
300 |
|
|
|a 1 online resource (xxii, 262 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Title from Web page (viewed February 28, 2007).
|
520 |
|
|
|a Packed with vivid real-life cases, this comprehensive book addresses the most difficult to manage and costly of all security threats: the insider.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Part I: Background on Cyber Crime, Insider Threats, and ESM -- Chapter One: Cyber Crime and Cyber Criminals -- About this Chapter -- Computer Dependence and Internet Growth -- The Shrinking Vulnerability Threat Window -- Motivations for Cyber Criminal Activity -- o Black Markets -- Hacker -- Script Kiddies -- Solitary Cyber Criminals and Exploit Writers for Hire -- Organized Crime -- Identity Thieves (Impersonation Fraudsters) -- Competitors -- Activist Groups, Nation-State Threats, and Terrorists -- Activists -- Nation-State Threats -- o China -- o France -- o Russia -- o United Kingdom -- o United States -- Terrorists -- Insiders -- Tools of the Trade -- o Application-Layer Exploits -- o Botnets -- o Buffer Overflows -- o Code Packing -- o Denial-of-service (DoS) Attacks -- o More Aggressive and Sophisticated Malware -- o Non-wired Attacks and Mobile Devices -- o Password-cracking -- o Phishing -- o Reconnaissance and Googledorks -- o Rootkits and Keyloggers -- o Social Engineering Attacks -- o Voice over IP (VoIP) Attacks -- o Zero-Day Exploits -- Summary Points -- Chapter Two: Insider Threats -- Understanding Who the Insider Is -- Psychology of Insider Identification -- Insider Threat Examples from the Media -- Insider Threats from a Human Perspective -- o A Word on Policies -- Insider Threats from a Business Perspective -- o Risk -- Insider Threats from a Technical Perspective -- o Need-to-know -- o Least Privileges -- o Separation of Duties -- o Strong Authentication -- o Access Controls -- o Incident Detection and Incident Management -- Summary Points -- -- Chapter Three: Enterprise Security Management (ESM) -- ESM in a Nutshell -- Key ESM Feature Requirements -- o Event Collection -- o Normalization -- o Categorization -- o Asset Information -- o Vulnerability Information -- o Zoning and Global Positioning System Data -- o Active Lists -- o Actors -- o Data Content -- o Correlation -- o Prioritization -- o Event and Response Time Reduction -- o Anomaly Detection -- o Pattern Discovery -- o Alerting -- o Case Management -- o Real-Time Analysis and Forensic Investigation -- o Visualization -- o High-level Dashboards -- o Detailed Visualization -- o Reporting -- o Remediation -- Return On Investment (ROI) and Return On Security Investment (ROSI) -- Alternatives to ESM -- o Do Nothing -- o Custom In-house Solutions -- o Outsourcing and Co-sourcing --? Co-sourcing examples: -- Summary Points -- -- Part II: Real Life Case Studies -- Chapter Four: Imbalanced SecurityA Singaporean Data Center -- Chapter Five: Correlating Physical and Logical Security EventsA U.S. Government Organization -- Chapter Six: Insider with a ConscienceAn Austrian Retailer -- Chapter Seven: Collaborative ThreatA Telecommunications Company in the U.S. -- Chapter Eight: Outbreak from WithinA Financial Organization in the U.K. -- Chapter Nine: Mixing Revenge and PasswordsA Utility Company in Brazil -- Chapter Ten: Rapid RemediationA University in the United States -- Chapter Eleven: Suspicious ActivityA Consulting Company in Spain -- Chapter Twelve: Insiders Abridged -- Malicious use of Medical Records -- Hosting Pirated Software -- Pod-Slurping -- Auctioning State Property -- Writing Code for another Company -- Outsourced Insiders -- Smuggling Gold in Rattus Norvegicus -- -- Part III: The Extensibility of ESM -- Chapter Thirteen: Establishing Chain-of-Custody Best Practices with ESM -- Disclaimer -- Monitoring and disclosure -- Provider Protection Exception -- Consent Exception -- Computer Trespasser Exception -- Court Order Exception -- Best Practices -- Canadian Best Evidence Rule -- Summary Points -- -- Chapter Fourteen: Addressing Both Insider Threats and Sarbanes-Oxley with ESM -- A Primer on Sarbanes-Oxley -- Section 302: Corporate Responsibility for Financial Reports -- Section 404: Management Assessment of Internal Controls -- Separation of Duties -- Monitoring Interaction with Financial Processes -- Detecting Changes in Controls over Financial Systems -- Section 409: Real-time Issuer Disclosures -- Summary Points -- -- Chapter Fifteen: Incident Management with ESM -- Incident Management Basics -- Improved Risk Management -- Improved Compliance -- Reduced Costs -- Current Challenges -- o Process -- o Organization -- o Technology -- Building an Incident Management Program -- o Defining Risk -- Five Steps to Risk Definition for Incident Management -- o Process -- o Training -- o Stakeholder Involvement -- o Remediation -- o Documentation -- Reporting and Metrics -- Summary Points -- -- Chapter Sixteen: Insider Threat Questions and Answers -- Introduction -- Insider Threat Recap -- Question One -- Employees -- o The Hiring Process -- o Reviews -- o Awareness -- o NIST 800-50 -- o Policies -- o Standards -- o Security Memorandum Example -- Question Two -- Prevention -- Question Three Asset Inventories -- Question Four Log Collection -- o Security Application Logs -- o Operating System Log -- o Web Server Logs -- o NIST 800-92 -- Question Five Log Analysis -- Question Six -- Specialized Insider Content -- Question Seven Physical and Logical Security Convergence -- Question Eight IT Governance -- o NIST 800-53 -- o Network Account Deletion maps to NIST 800-53 section AC-2 -- o Vulnerability Scanning maps to NIST 800-53 section RA-5 -- o Asset Creation maps to NIST 800-53 section CM-4 -- o Attacks and Suspicious Activity from Public Facing Assets maps to NIST 800-53 section SC-14 -- o Traffic from Internal to External Assets maps to NIST 800-53 section SC-7 -- Question Nine -- Incident Response -- Question 10 Must Haves -- -- Appendix AExamples of Cyber Crime Prosecutions.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Hackers.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Pirates informatiques.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Computer security.
|2 blmlsh
|
650 |
|
7 |
|a Computer hackers.
|2 blmlsh
|
650 |
|
7 |
|a Hackers.
|2 fast
|0 (OCoLC)fst00872150
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
776 |
0 |
8 |
|i Print version:
|a Contos, Brian T.
|t Enemy at the water cooler.
|d Rockland, MA : Syngress, ©2006
|z 1597491292
|z 9781597491297
|w (OCoLC)71843890
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781597491297/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00013585
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL294116
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10186105
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 196374
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2586072
|
994 |
|
|
|a 92
|b IZTAP
|