Insider Attack and Cyber Security Beyond the Hacker /
Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of the insider attack problem as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Computer Sc...
Call Number: | Libro Electrónico |
---|---|
Corporate Author: | |
Other Authors: | , , , , , |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
New York, NY :
Springer US : Imprint: Springer,
2008.
|
Edition: | 1st ed. 2008. |
Series: | Advances in Information Security,
39 |
Subjects: | |
Online Access: | Texto Completo |
Table of Contents:
- The Insider Attack Problem Nature and Scope
- Reflections on the Insider Threat
- The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures
- Data Theft: A Prototypical Insider Threat
- A Survey of Insider Attack Detection Research
- Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure
- Towards a Virtualization-enabled Framework for Information Traceability (VFIT)
- Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach
- Surviving Insider Attacks: A Call for System Experiments
- Preventative Directions For Insider Threat Mitigation Via Access Control
- Taking Stock and Looking Forward - An Outsider's Perspective on the Insider Threat
- Hard Problems and Research Challenges
- Hard Problems and Research Challenges Concluding Remarks.