Cargando…

Insider threat : a guide to understanding, detecting, and defending against the enemy from within /

Learn how to build a defense program against insider threats Insiders are not always employees and insider threats are not always intentional. This new title from Dr Julie Mehan looks beyond perimeter protection tools and shows how a security culture based on international best practice can help mit...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Mehan, Julie E. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2016.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn967776843
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 170106s2016 enka ob 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d STF  |d CEF  |d KSU  |d DEBBG  |d UAB  |d CZL  |d OCLCO  |d OCLCQ 
020 |z 9781849288415 
029 1 |a GBVCP  |b 897170512 
035 |a (OCoLC)967776843 
037 |a CL0500000813  |b Safari Books Online 
050 4 |a K3278 
082 0 4 |a 352.3/79  |q OCoLC  |2 23/eng/20230216 
049 |a UAMI 
100 1 |a Mehan, Julie E.,  |e author. 
245 1 0 |a Insider threat :  |b a guide to understanding, detecting, and defending against the enemy from within /  |c Dr. Julie E. Mehan. 
264 1 |a Ely, Cambridgeshire, United Kingdom :  |b IT Governance Publishing,  |c 2016. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references. 
588 |a Description based on online resource; title from title page (viewed January 5, 2017). 
520 |a Learn how to build a defense program against insider threats Insiders are not always employees and insider threats are not always intentional. This new title from Dr Julie Mehan looks beyond perimeter protection tools and shows how a security culture based on international best practice can help mitigate the insider threat to your security. Discover: The common characteristics of insider threat victims. The typical stages of a malicious attack. The steps you can take to implement a successful insider threat program. How to construct a three-tier security culture, encompassing artifacts, values and shared assumptions. "The author has many, many sound things to say about security culture and practice." Mark Rowe Use international best practice to implement a high-impact plan Using security controls from the ISO 27001, ISO 27002, and NIST SP 800-53 standards, this title will help you address: Risk mitigation and the eight steps of a risk assessment Staff training and awareness, and conducting background screening Monitoring and auditing the activities of general and privileged users, and quickly responding to suspicious behaviors Metrics to measure insider threat behavior and mitigation The challenge of external or temporary insiders (such as consultants, support contractors, partners, service providers, temporary employees) Layering physical and digital defenses to provide defense in depth The importance of conducting regular penetration testing to evaluate security controls Limiting, monitoring and controlling remote access and mobile device use Ensuring supply-chain security Maintaining an incident management capability The insider threat Every type of organization is vulnerable to insider abuse, errors or malicious attacks. These can impact reputation, operations and profitability, and expose data, harm the organization, or deliver valuable intellectual property into competitors' hands. Insiders can be current or former employees, contractors, or other business partners who have been granted authorized access to networks, systems or data, and all of them can bypass security measures through legitimate means. Prepare for insider threats with the most in-depth guide on the market and build a defense program using international best practice. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Internal security. 
650 0 |a National security. 
650 6 |a Sûreté de l'État. 
650 7 |a Internal security.  |2 fast  |0 (OCoLC)fst00976624 
650 7 |a National security.  |2 fast  |0 (OCoLC)fst01033711 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781849288415/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP