Bellovin, Steven M.
Insider Attack and Cyber Security
1. The Insider Attack Problem Nature and Scope
Steven M. Bellovin
2. Reflections on the Insider Threat
Charles P. Pfleeger
3. The “Big Picture” of Insider IT Sabotage Across U.S. Critical Infrastructures
Andrew P. Moore, Dawn M. Cappelli, Randall F. Trzeciak
4. Data Theft: A Prototypical Insider Threat
Michael McCormick
5. A Survey of Insider Attack Detection Research
Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo
6. Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure
Kevin S. Killourhy, Roy A. Maxion
7. Towards a Virtualization-enabled Framework for Information Traceability (VFIT)
Ravi Sahita, Uday Savagaonkar
8. Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach
Ravishankar K. Iyer, Paul Dabrowski, Nithin Nakka, Zbigniew Kalbarczyk
9. Surviving Insider Attacks: A Call for System Experiments
Virgil D. Gligor, C. Sekar Chandersekaran
10. Preventative Directions For Insider Threat Mitigation Via Access Control
Sara Sinclair, Sean W. Smith
11. Taking Stock and Looking Forward – An Outsider’s Perspective on the Insider Threat
Jeffrey Hunker
12. Hard Problems and Research Challenges
Angelos D. Keromytis
13. Hard Problems and Research Challenges Concluding Remarks
Angelos D. Keromytis
DRM-restrictions
Printing: not available
Clipboard copying: not available
Avainsanat: COMPUTERS / Computer Science COM014000
- Tekijä(t)
- Bellovin, Steven M.
- Hershkop, Shlomo
- Keromytis, Angelos D.
- Sinclair, Sara
- Smith, Sean W.
- Stolfo, Salvatore J.
- Julkaisija
- Springer
- Julkaisuvuosi
- 2008
- Kieli
- en
- Painos
- 1
- Kategoria
- Tietotekniikka, tietoliikenne
- Tiedostomuoto
- E-kirja
- eISBN (PDF)
- 9780387773223