Insider Threat  
Published by IT Governance Publishing
Publication Date:  Available in all formats
ISBN: 9781849288415
Pages: 0

EBOOK (EPUB)

EBOOK (PDF)

ISBN: 9781849288415 Price: INR 3774.75
Add to cart Buy Now
Subject(s): The Hidden Threat
Every type of organisation is vulnerable to insider abuse, errors, and malicious attacks: grant anyone access to a system and you automatically introduce a vulnerability. Insiders can be current or former employees, contractors, or other business partners who have been granted authorised access to networks, systems, or data, and all of them can bypass security measures through legitimate means. Insider Threat – A Guide to Understanding, Detecting, and Defending Against the Enemy from Within shows how a security culture based on international best practice can help mitigate the insider threat, providing short-term quick fixes and long-term solutions that can be applied as part of an effective insider threat program. Read this book to learn the seven organisational characteristics common to insider threat victims; the ten stages of a malicious attack; the ten steps of a successful insider threat program; and the construction of a three-tier security culture, encompassing artefacts, values, and shared assumptions. Perhaps most importantly, it also sets out what not to do, listing a set of worst practices that should be avoided.
Rating
Description
Subject(s): The Hidden Threat
Every type of organisation is vulnerable to insider abuse, errors, and malicious attacks: grant anyone access to a system and you automatically introduce a vulnerability. Insiders can be current or former employees, contractors, or other business partners who have been granted authorised access to networks, systems, or data, and all of them can bypass security measures through legitimate means. Insider Threat – A Guide to Understanding, Detecting, and Defending Against the Enemy from Within shows how a security culture based on international best practice can help mitigate the insider threat, providing short-term quick fixes and long-term solutions that can be applied as part of an effective insider threat program. Read this book to learn the seven organisational characteristics common to insider threat victims; the ten stages of a malicious attack; the ten steps of a successful insider threat program; and the construction of a three-tier security culture, encompassing artefacts, values, and shared assumptions. Perhaps most importantly, it also sets out what not to do, listing a set of worst practices that should be avoided.
Table of contents
  • Cover
  • Title
  • Copyright
  • Dedication
  • Preface
  • About the Author
  • Acknowledgements
  • Contents
  • List of Figures
  • List of Tables
  • Introduction
  • Chapter 1: The Hidden Threat
    • Why The Insider Threat is Called ‘The Hidden Threat’
    • Defining the Insider
    • Insider Threat Has Many Forms
  • Chapter 2: Insider Threat Models and Indicators
    • The Bricks and Mortar Insider
    • Hard Copy-Based Insider
    • The Transitional Insider
    • Bits and Bytes Insider
    • Behavior Traits and Patterns Associated with Insider Threat
    • Insider Motivations and Enablers
    • The Psychology of an Insider – The Snowden Case
    • Organizational Characteristics and Insider Threat
    • The Life Stages of the Insider Threat
    • The Radicalized Insider Threat
    • A Note of Caution – Privacy and Ethical Concerns
  • Chapter 3: The Unintentional Insider Threat
    • Social Engineering
    • The Careless UIT
    • Social Media and the UIT
  • Chapter 4: Insider Threat, Big Data and the Cloud
    • Cloud Computing
    • Big Data
    • Cloud Computing & Big Data Insider Threat Concerns
    • FedRAMP - US Efforts to Secure the Cloud against Insider Threat
  • Chapter 5: Regional Perspectives on Insider Threat
    • Regional Perspectives – Different Views on Insider Threat
  • Chapter 6: Best Practices, Controls and Quick Wins
    • Policy and Strategic Initiatives
    • Training and Awareness
    • Personnel Security and Management
    • Prevention and Deterrence
    • Reaction, Response, and Recovery
    • Insider Threat ‘Worst Practices’
  • Chapter 7: Final Thoughts
  • End Notes
  • ITG Resources
User Reviews
Rating