Summary of discussions at a planning meeting on cyber-security and the insider threat to classified information /
OF DISCUSSIONS AT A PLANNING MEETING ON CYBER-SECURITY AND THE INSIDER THREAT TO CLASSIFIED INFORMATION -- 1. INTRODUCTION -- 2. HIGH-GRADE THREATS AND HIGH-VALUE TARGETS -- 3. PSYCHOLOGICAL, SOCIAL, LEGAL AND MANAGERIAL ASPECTS OF THE INSIDER THREAT -- Differing Categories of and Motivations for In...
Call Number: | Libro Electrónico |
---|---|
Corporate Author: | |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Washington, D.C. :
National Academies Press,
2000.
|
Subjects: | |
Online Access: | Texto completo |
Table of Contents:
- SUMMARY OF DISCUSSIONS AT A PLANNING MEETING ON CYBER-SECURITY AND THE INSIDER THREAT TO CLASSIFIED INFORMATION
- 1. INTRODUCTION
- 2. HIGH-GRADE THREATS AND HIGH-VALUE TARGETS
- 3. PSYCHOLOGICAL, SOCIAL, LEGAL AND MANAGERIAL ASPECTS OF THE INSIDER THREAT
- Differing Categories of and Motivations for Insiders
- Need for Data and Modeling Techniques
- Management Issues
- Legal Issues
- 4. TECHNOLOGY, PRESENT AND FUTURE
- Technologies in Use and Their Limitations
- Emerging Tools
- 5. OPTIONS FOR CSTB
- NEXT STEPS
- APPENDIX A ON THE NATIONAL ACADEMIESAPPENDIX B PLANNING MEETING ON CYBER-SECURITY AND THE INSIDER THREAT TO CLASSIFIEDINFORMATION-NOVEMBER 1�2, 2000LIST OF�
- APPENDIX C MEETING AGENDA