Insider attack and cyber security : beyond the hacker
Main Author: | |
---|---|
Format: | Book |
Language: | English |
Published: |
New York :
Springer ,
c2008
|
Series: | Advances in information security
39 |
Subjects: | |
Online Access: | Table of contents only Publisher description |
Table of Contents:
- 1. The insider attack problem nature and scope
- 2. Reflections on the insider threat
- 3. The "big picture" of insider IT sabotage across U.S critical infrastructures
- 4. Data theft: A prototypical insider threat
- 5. A survey of insider attack detection research
- 6. Naive bayes a masquerade detector: addressing a chronic failure
- 7. Towards a virtualization-enabled framework for information traceability (VFIT)
- 8. Reconfigurable tamper-resistant hardware support against insider threats: the trusted ILLIAC approach
- 9. Surviving insider attacks: a call for system experiments
- 10. Preventative direction for insider threat mitigation via access control
- 11. Taking stock and looking forward-an outsider's perspective on the insider threat
- 12. Research challenges for fighting insider threat in the financial sevices industry
- 13. Hard problem and research challenges concluding remarks