Cargando…

Insider threat : prevention, detection, mitigration, and deterrence /

Presents a set of solutions to address the increase in cases of insider threat, including espionage, embezzlement, sabotage, fraud, intellectual property theft, and research and development theft. Focuses on management and employee engagement, as well as ethical, legal, and privacy concerns. Also in...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Gelles, Michael G.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Oxford, UK : Butterworth-Heinemann is an imprint of Elsevier, 2016.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn951075836
003 OCoLC
005 20231120112112.0
006 m o d
007 cr |n|||||||||
008 160603s2016 enk ob 001 0 eng d
040 |a IDEBK  |b eng  |e pn  |c IDEBK  |d N$T  |d CDX  |d OPELS  |d N$T  |d EBLCP  |d OCLCF  |d YDXCP  |d GGVRL  |d OCLCQ  |d DEBSZ  |d IDB  |d W2U  |d OCLCQ  |d MERUC  |d MERER  |d OCLCQ  |d OCLCA  |d U3W  |d WRM  |d D6H  |d BRX  |d OCLCQ  |d S2H  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 951158743  |a 951593384  |a 956735867  |a 957637051  |a 957954875  |a 958083673  |a 958096479  |a 958350291  |a 958479519  |a 961203920  |a 961407787  |a 972854002  |a 972953542  |a 973125310  |a 993088691  |a 1279017628  |a 1280070758 
020 |a 0128026227  |q (electronic bk.) 
020 |a 9780128026229  |q (electronic bk.) 
020 |z 9780128024102 
020 |z 0128024100 
035 |a (OCoLC)951075836  |z (OCoLC)951158743  |z (OCoLC)951593384  |z (OCoLC)956735867  |z (OCoLC)957637051  |z (OCoLC)957954875  |z (OCoLC)958083673  |z (OCoLC)958096479  |z (OCoLC)958350291  |z (OCoLC)958479519  |z (OCoLC)961203920  |z (OCoLC)961407787  |z (OCoLC)972854002  |z (OCoLC)972953542  |z (OCoLC)973125310  |z (OCoLC)993088691  |z (OCoLC)1279017628  |z (OCoLC)1280070758 
050 4 |a HD61.5  |b .G4 2016eb 
072 7 |a BUS  |x 082000  |2 bisacsh 
072 7 |a BUS  |x 041000  |2 bisacsh 
072 7 |a BUS  |x 042000  |2 bisacsh 
072 7 |a BUS  |x 085000  |2 bisacsh 
082 0 4 |a 658.4/73  |2 23 
100 1 |a Gelles, Michael G. 
245 1 0 |a Insider threat :  |b prevention, detection, mitigration, and deterrence /  |c Michael G. Gelles. 
264 1 |a Oxford, UK :  |b Butterworth-Heinemann is an imprint of Elsevier,  |c 2016. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
588 0 |a Print version record. 
505 0 |a Front Cover; Insider Threat; Copyright Page; Contents; About Deloitte; About the Author; Foreword; Acknowledgments; 1 Introduction -- Insider Threat Today; Introduction; Looking Ahead; This Book; What is Insider Threat?; What Motivates an Insider to Act?; Environmental Drivers; "Bricks and Mortar" to "Bits and Bytes"; The Virtual Space; Exfiltration Points; Technology and the Insider Threat; Changing Workplace Demographics; Social Media and Validation:; A Technical Workforce:; Expectations of Ownership:; Limited Control:; Challenges Managing Information:; Information Mobility. 
505 8 |a Detecting the Insider ThreatPatterns of Behavior; Mitigating Asset Loss: An Integrated Approach; Defining Critical Assets; Detection; Developing a Secure Workforce; Establishing a Workforce Culture to Mitigate Risk; Top 10 Tips for Leaders; 1 Define The Insider Threats; 2 Define Your Risk Appetite; 3 Optimize a Broad Set of Stakeholders; 4 Don't Forget the Fundamentals; 5 Trust but Verify; 6 Look for Precursors; 7 Connect the Dots; 8 Stay a Step Ahead; 9 Set Behavioral Expectations; 10 One Size Does Not Fit All; In Summary; Key Takeaways. 
505 8 |a 2 Common Challenges to Maturing an Insider Threat ProgramIntroduction; Challenges Faced by Program Managers; Are There More Insider Threat Cases Now Than There Have Been in the Past?; How Does an Organization Define Insider Threat?; Why Do Insider Threat Programs Need to Look Beyond the Malicious Insider?; Why Are Insider Threat Related Policies and Training Important?; What Capabilities Differentiate an Industry-Leading Insider Threat Program?; How Do I Escalate and Triage Potential Threats Identified by the Program?; How Do I Position an Insider Threat Program to My Workforce? 
505 8 |a How Do I Scale My Insider Threat Program?What are the Skillsets a Leading Program Needs to Have?; What Data are Needed to Proactively Identify Potential Insiders?; How Do I Evaluate and Select an Advanced Analytics Tool?; What Challenges are Generally Encountered When Standing Up a Program?; How Mature Does My Program Have to Be?; How do You Measure the Return on Investment?; Key Metrics; A Global Perspective; Key Takeaways; 3 From Bricks and Mortar to Bits and Bytes; The Transformation from Bricks and Mortar to Bits and Bytes; Insider Threat in a World of Bricks and Mortar. 
505 8 |a Transitional PhaseInsider Threat in a World of Bits and Bytes; Same Behavior, Different Context; Is Insider Activity More Prevalent Now?; The Workforce in a World of Bits and Bytes; Mitigating the Insider Threat in the World of Bits and Bytes; The Insider Threat of Bits and Bytes: A Case Study; Key Takeaways; 4 Identifying Functional Ownership; Introduction; Program Location; Executive Support; Independence; Collaboration; Developing a Program to Prevent, Detect, and Respond Framework; Program Ownership; Functional Assessment in Choosing a Program Owner; Program Design; Strategic Framework. 
504 |a Includes bibliographical references and index. 
520 |a Presents a set of solutions to address the increase in cases of insider threat, including espionage, embezzlement, sabotage, fraud, intellectual property theft, and research and development theft. Focuses on management and employee engagement, as well as ethical, legal, and privacy concerns. Also includes tactics on how to collect, correlate, and visualize potential risk indicators into a seamless system for protecting an organization's critical assets. 
650 0 |a Business enterprises  |x Security measures. 
650 0 |a Employee crimes  |x Prevention. 
650 0 |a Risk assessment. 
650 6 |a Entreprises  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0223973 
650 6 |a �Evaluation du risque.  |0 (CaQQLa)201-0139195 
650 7 |a risk assessment.  |2 aat  |0 (CStmoGRI)aat300263660 
650 7 |a BUSINESS & ECONOMICS  |x Industrial Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management Science.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Organizational Behavior.  |2 bisacsh 
650 7 |a Business enterprises  |x Security measures  |2 fast  |0 (OCoLC)fst00842623 
650 7 |a Employee crimes  |x Prevention  |2 fast  |0 (OCoLC)fst00908967 
650 7 |a Risk assessment  |2 fast  |0 (OCoLC)fst01098146 
776 0 8 |i Print version:  |a Gelles, Michael G.  |t Insider threat  |z 9780128024102  |w (OCoLC)909329997 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780128024102  |z Texto completo 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780128024102  |z Texto completo