|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
SCIDIR_ocn951075836 |
003 |
OCoLC |
005 |
20231120112112.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
160603s2016 enk ob 001 0 eng d |
040 |
|
|
|a IDEBK
|b eng
|e pn
|c IDEBK
|d N$T
|d CDX
|d OPELS
|d N$T
|d EBLCP
|d OCLCF
|d YDXCP
|d GGVRL
|d OCLCQ
|d DEBSZ
|d IDB
|d W2U
|d OCLCQ
|d MERUC
|d MERER
|d OCLCQ
|d OCLCA
|d U3W
|d WRM
|d D6H
|d BRX
|d OCLCQ
|d S2H
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 951158743
|a 951593384
|a 956735867
|a 957637051
|a 957954875
|a 958083673
|a 958096479
|a 958350291
|a 958479519
|a 961203920
|a 961407787
|a 972854002
|a 972953542
|a 973125310
|a 993088691
|a 1279017628
|a 1280070758
|
020 |
|
|
|a 0128026227
|q (electronic bk.)
|
020 |
|
|
|a 9780128026229
|q (electronic bk.)
|
020 |
|
|
|z 9780128024102
|
020 |
|
|
|z 0128024100
|
035 |
|
|
|a (OCoLC)951075836
|z (OCoLC)951158743
|z (OCoLC)951593384
|z (OCoLC)956735867
|z (OCoLC)957637051
|z (OCoLC)957954875
|z (OCoLC)958083673
|z (OCoLC)958096479
|z (OCoLC)958350291
|z (OCoLC)958479519
|z (OCoLC)961203920
|z (OCoLC)961407787
|z (OCoLC)972854002
|z (OCoLC)972953542
|z (OCoLC)973125310
|z (OCoLC)993088691
|z (OCoLC)1279017628
|z (OCoLC)1280070758
|
050 |
|
4 |
|a HD61.5
|b .G4 2016eb
|
072 |
|
7 |
|a BUS
|x 082000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 041000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 042000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 085000
|2 bisacsh
|
082 |
0 |
4 |
|a 658.4/73
|2 23
|
100 |
1 |
|
|a Gelles, Michael G.
|
245 |
1 |
0 |
|a Insider threat :
|b prevention, detection, mitigration, and deterrence /
|c Michael G. Gelles.
|
264 |
|
1 |
|a Oxford, UK :
|b Butterworth-Heinemann is an imprint of Elsevier,
|c 2016.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Front Cover; Insider Threat; Copyright Page; Contents; About Deloitte; About the Author; Foreword; Acknowledgments; 1 Introduction -- Insider Threat Today; Introduction; Looking Ahead; This Book; What is Insider Threat?; What Motivates an Insider to Act?; Environmental Drivers; "Bricks and Mortar" to "Bits and Bytes"; The Virtual Space; Exfiltration Points; Technology and the Insider Threat; Changing Workplace Demographics; Social Media and Validation:; A Technical Workforce:; Expectations of Ownership:; Limited Control:; Challenges Managing Information:; Information Mobility.
|
505 |
8 |
|
|a Detecting the Insider ThreatPatterns of Behavior; Mitigating Asset Loss: An Integrated Approach; Defining Critical Assets; Detection; Developing a Secure Workforce; Establishing a Workforce Culture to Mitigate Risk; Top 10 Tips for Leaders; 1 Define The Insider Threats; 2 Define Your Risk Appetite; 3 Optimize a Broad Set of Stakeholders; 4 Don't Forget the Fundamentals; 5 Trust but Verify; 6 Look for Precursors; 7 Connect the Dots; 8 Stay a Step Ahead; 9 Set Behavioral Expectations; 10 One Size Does Not Fit All; In Summary; Key Takeaways.
|
505 |
8 |
|
|a 2 Common Challenges to Maturing an Insider Threat ProgramIntroduction; Challenges Faced by Program Managers; Are There More Insider Threat Cases Now Than There Have Been in the Past?; How Does an Organization Define Insider Threat?; Why Do Insider Threat Programs Need to Look Beyond the Malicious Insider?; Why Are Insider Threat Related Policies and Training Important?; What Capabilities Differentiate an Industry-Leading Insider Threat Program?; How Do I Escalate and Triage Potential Threats Identified by the Program?; How Do I Position an Insider Threat Program to My Workforce?
|
505 |
8 |
|
|a How Do I Scale My Insider Threat Program?What are the Skillsets a Leading Program Needs to Have?; What Data are Needed to Proactively Identify Potential Insiders?; How Do I Evaluate and Select an Advanced Analytics Tool?; What Challenges are Generally Encountered When Standing Up a Program?; How Mature Does My Program Have to Be?; How do You Measure the Return on Investment?; Key Metrics; A Global Perspective; Key Takeaways; 3 From Bricks and Mortar to Bits and Bytes; The Transformation from Bricks and Mortar to Bits and Bytes; Insider Threat in a World of Bricks and Mortar.
|
505 |
8 |
|
|a Transitional PhaseInsider Threat in a World of Bits and Bytes; Same Behavior, Different Context; Is Insider Activity More Prevalent Now?; The Workforce in a World of Bits and Bytes; Mitigating the Insider Threat in the World of Bits and Bytes; The Insider Threat of Bits and Bytes: A Case Study; Key Takeaways; 4 Identifying Functional Ownership; Introduction; Program Location; Executive Support; Independence; Collaboration; Developing a Program to Prevent, Detect, and Respond Framework; Program Ownership; Functional Assessment in Choosing a Program Owner; Program Design; Strategic Framework.
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a Presents a set of solutions to address the increase in cases of insider threat, including espionage, embezzlement, sabotage, fraud, intellectual property theft, and research and development theft. Focuses on management and employee engagement, as well as ethical, legal, and privacy concerns. Also includes tactics on how to collect, correlate, and visualize potential risk indicators into a seamless system for protecting an organization's critical assets.
|
650 |
|
0 |
|a Business enterprises
|x Security measures.
|
650 |
|
0 |
|a Employee crimes
|x Prevention.
|
650 |
|
0 |
|a Risk assessment.
|
650 |
|
6 |
|a Entreprises
|x S�ecurit�e
|x Mesures.
|0 (CaQQLa)201-0223973
|
650 |
|
6 |
|a �Evaluation du risque.
|0 (CaQQLa)201-0139195
|
650 |
|
7 |
|a risk assessment.
|2 aat
|0 (CStmoGRI)aat300263660
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Industrial Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management Science.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Organizational Behavior.
|2 bisacsh
|
650 |
|
7 |
|a Business enterprises
|x Security measures
|2 fast
|0 (OCoLC)fst00842623
|
650 |
|
7 |
|a Employee crimes
|x Prevention
|2 fast
|0 (OCoLC)fst00908967
|
650 |
|
7 |
|a Risk assessment
|2 fast
|0 (OCoLC)fst01098146
|
776 |
0 |
8 |
|i Print version:
|a Gelles, Michael G.
|t Insider threat
|z 9780128024102
|w (OCoLC)909329997
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780128024102
|z Texto completo
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780128024102
|z Texto completo
|