Normal view MARC view ISBD view

Insider Threats in Cyber Security [electronic resource] / edited by Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop.

By: Probst, Christian W [editor.].
Contributor(s): Hunker, Jeffrey [editor.] | Gollmann, Dieter [editor.] | Bishop, Matt [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Advances in Information Security: 49Publisher: Boston, MA : Springer US, 2010Description: XII, 244 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9781441971333.Subject(s): Computer science | Computer network architectures | Computer Communication Networks | Data protection | Data structures (Computer science) | Data encryption (Computer science) | Information systems | Computer Science | Systems and Data Security | Computer Communication Networks | Data Encryption | Information Systems Applications (incl.Internet) | Data Structures, Cryptology and Information Theory | Computer Systems Organization and Communication NetworksDDC classification: 005.8 Online resources: Click here to access online
Contents:
Aspects of Insider Threats -- Combatting Insider Threats -- Insider Threat and Information Security Management -- A State of the Art Survey of Fraud Detection Technology -- Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation -- A Risk Management Approach to the “Insider Threat” -- Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection -- Towards an Access-Control Framework for Countering Insider Threats -- Monitoring Technologies for Mitigating Insider Threats -- Insider Threat Specification as a Threat Mitigation Technique.
In: Springer eBooksSummary: Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior Policy Advisor at MCI, Ontario, Canada comments "The book will be a must read, so of course I’ll need a copy." Insider Threats in Cyber Security covers all aspects of insider threats, from motivation to mitigation. It includes how to monitor insider threats (and what to monitor for), how to mitigate insider threats, and related topics and case studies. Insider Threats in Cyber Security is intended for a professional audience composed of the military, government policy makers and banking; financing companies focusing on the Secure Cyberspace industry. This book is also suitable for advanced-level students and researchers in computer science as a secondary text or reference book.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Aspects of Insider Threats -- Combatting Insider Threats -- Insider Threat and Information Security Management -- A State of the Art Survey of Fraud Detection Technology -- Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation -- A Risk Management Approach to the “Insider Threat” -- Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection -- Towards an Access-Control Framework for Countering Insider Threats -- Monitoring Technologies for Mitigating Insider Threats -- Insider Threat Specification as a Threat Mitigation Technique.

Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior Policy Advisor at MCI, Ontario, Canada comments "The book will be a must read, so of course I’ll need a copy." Insider Threats in Cyber Security covers all aspects of insider threats, from motivation to mitigation. It includes how to monitor insider threats (and what to monitor for), how to mitigate insider threats, and related topics and case studies. Insider Threats in Cyber Security is intended for a professional audience composed of the military, government policy makers and banking; financing companies focusing on the Secure Cyberspace industry. This book is also suitable for advanced-level students and researchers in computer science as a secondary text or reference book.

There are no comments for this item.

Log in to your account to post a comment.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue