Umfang:
1 Online-Ressource
ISBN:
9781849280112
,
1849280118
,
184928010X
,
9781849280105
,
1282384759
,
9781282384750
,
9786612384752
,
6612384751
Inhalt:
The insider threat poses a significant and increasing problem for organisations. The use of highly connected computers makes controlling information much more difficult than in the past. This new pocket guide intends to shed light on the key security issues facing organisations from insiders to get them up to speed quickly
Anmerkung:
Includes bibliographical references
,
CHAPTER 1: MODELLING THE INSIDER THREAT; What is the insider threat?; Architectural security model; An attack classification scheme; Attack surface; Impact zone; System hardening; Targeting the attacker; CHAPTER 2: INSIDER ATTACKS; Insider attack classification; Damage; Defensive protection; Fraud; Theft; Conclusions; APPENDIX: FURTHER READING; ITG RESOURCES.
,
English
Weitere Ausg.:
Erscheint auch als ISBN 9781849280105
Sprache:
Englisch
Bookmarklink