rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781441971326

Insider Threats in Cyber Security

by ; ; ;
  • ISBN13:

    9781441971326

  • ISBN10:

    1441971327

  • Format: Hardcover
  • Copyright: 2010-09-01
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $149.99 Save up to $110.75
  • Digital
    $85.02*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior Policy Advisor at MCI, Ontario, Canada comments "The book will be a must read, so of course I'll need a copy."Insider Threats in Cyber Security covers all aspects of insider threats, from motivation to mitigation. It includes how to monitor insider threats (and what to monitor for), how to mitigate insider threats, and related topics and case studies. Insider Threats in Cyber Security is intended for a professional audience composed of the military, government policy makers and banking; financing companies focusing on the Secure Cyberspace industry. This book is also suitable for advanced-level students and researchers in computer science as a secondary text or reference book.

Table of Contents

Aspects of Insider Threatsp. 1
Introductionp. 1
Insiders and Insider Threatsp. 2
Insider Threatsp. 5
Taxonomiesp. 6
Detection and Mitigationp. 7
Policiesp. 9
Human Factors and Compliancep. 11
Conclusionp. 13
Referencesp. 15
Combatting Insider Threatsp. 17
A Contextual View of Insiders and Insider Threatsp. 17
Risks of Insider Misusep. 20
Types of Insidersp. 20
Types of Insider Misusep. 21
Threats, Vulnerabilities, and Risksp. 22
Relevant Knowledge and Experiencep. 23
Exploitations of Vulnerabilitiesp. 24
Potential Risks Resulting from Exploitationsp. 25
Countermeasuresp. 25
Specification of Sound Policies for Data Gathering and Monitoringp. 27
Detection, Analysis, and Identification of Misusep. 28
Desired Responses to Detected Anomalies and Misusesp. 29
Decomposition of Insider Misuse Problemsp. 29
Stages of Development and Usep. 30
Extended Profiling Including Psychological and Other Factorsp. 31
Requirements for Insider-Threat-Resistant High-Integrity Electionsp. 33
Relevance of the Countermeasures to Electionsp. 36
Research and Development Needsp. 39
Conclusionsp. 40
Referencesp. 41
Insider Threat and Information Security Managementp. 45
Introductionp. 45
Definitions of Insider and the Relevance to Information Security Managementp. 46
Risk and Insidernessp. 49
The Importance of Organisational Culture and the Significance of Cultural Risksp. 51
Fieldwork on Culture and the Insider Threatp. 51
The Structure of the ISMS and Traditional Information Security Management Responses to Insidernessp. 53
Analysis - Turning an ISMS Inwardsp. 54
The Role of Operationalisationp. 55
Information Security Management Standards, Best Practice and the Insider Threatp. 56
General Security Management Standardsp. 56
Guidelines Focused on the Management of the Insider Threatp. 57
Analysis of the Contribution of Best Practice and Guidelinesp. 60
Crime theories and insider threatp. 61
Existing Connections between Crime Theories and Information Security Managementp. 62
Implications of Crime Theories for ISMS Designp. 63
Application of SCP to the ISO Control Domainsp. 64
Implications for ISMS Process Designp. 66
Summary of Crime Theory Contributionp. 68
Conclusionsp. 69
Referencesp. 70
A State of the Art Survey of Fraud Detection Technologyp. 73
Introductionp. 73
Data Analysis Methodologyp. 74
Survey of Technology for Fraud Detection in Practicep. 76
General Approaches for Intrusion and Fraud Detectionp. 76
State of the Art of Fraud Detection Tools and Techniquesp. 78
Why Fraud Detection is not the Same as Intrusion Detectionp. 80
Challenges for Fraud Detection in Information Systemsp. 82
Summaryp. 82
Referencesp. 84
Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigationp. 85
Introductionp. 85
Backgroundp. 88
Issues of Security and Privacyp. 91
Predictive Modeling Approachp. 94
Training Needsp. 106
Conclusions and Research Challengesp. 109
Acknowledgmentsp. 111
Referencesp. 111
A Risk Management Approach to the "Insider Threat"p. 115
Introductionp. 116
Insider Threat Assessmentp. 117
Examplep. 120
Summaryp. 122
Access-Based Assessmentp. 122
Psychological Indicator-Based Assessmentp. 126
Application of Risk to System Countermeasuresp. 130
Examplep. 133
Summaryp. 135
Conclusionp. 135
Referencesp. 135
Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detectionp. 139
Introductionp. 139
Monitoring Modern Distributed Systemsp. 140
Evidence Modelp. 142
Observing Fraudulent Service Behavioursp. 145
Architectural Supportp. 148
Introduction to the Legal Perspectivep. 149
Basic Principles of Data Privacy Lawp. 150
A Set of Six Basic Rulesp. 151
General Legal Requirements of Fraud Detection Systemsp. 153
Privacy Relevance of Fraud Detection Systemsp. 153
Necessary Data for Fraud Detectionp. 154
Transparency in the Fraud Detection Contextp. 155
Purpose Specification and Binding in Fraud Detectionp. 155
Permissibility of Fraud Detectionp. 155
Quality of Event Datap. 156
Security of Event Datap. 156
Technical Solutions for Privacy-respecting Fraud Detectionp. 156
Technicla Requirementsp. 157
Lossless Information Reduction with Covered Datap. 161
Lossy Information Reductions for Timestampsp. 161
Legal Improvements by Pseudonymizing Event Datap. 165
Technical Descriptionp. 165
Privacy Relevance of Pseudonymized Event Datap. 166
Strengthening the Data Privacy Officialp. 167
Disclosure With Legal Permissionp. 167
Data and System Securityp. 168
Conclusionp. 168
Referencesp. 169
Towards an Access-Control Framework for Countering Insider Threatsp. 173
Introductionp. 173
Motivation and related workp. 177
Illustrative scenariosp. 177
Definitions of insidersp. 179
Access controlp. 180
The insider problem and access controlp. 181
Trust, trustworthiness, and the insider problemp. 182
Insidernessp. 183
Trust management and risk assessmentp. 183
Pragmatics of identifying suspicious eventsp. 184
Toward a context-and insider-aware policy languagep. 185
Context and request predicatesp. 186
Requirementsp. 186
Policy transformations via declarative programmingp. 187
Discussion of requirementsp. 188
Policy transformationsp. 189
Risk-and trustworthiness-aware policy compositionp. 190
Access-control architectures and the insider problemp. 191
Concluding remarksp. 192
Referencesp. 194
Monitoring Technologies for Mitigating Insider Threatsp. 197
Introductionp. 197
Related Researchp. 200
Threat Model - Level of Sophistication of the Attackerp. 201
Decoy Propertiesp. 202
Architecturep. 207
Decoy Document Distributorp. 207
SONARp. 208
Decoys and Network Monitoringp. 208
Host-based Sensorsp. 211
Concluding Remarks and Future Workp. 215
Referencesp. 217
Insider Threat Specification as a Threat Mitigation Techniquep. 219
Introductionp. 219
The Insider Threat Problemp. 220
Backgroundp. 221
The Common Intrusion Specification Languagep. 221
Panoptisp. 225
Insider Misuse Taxonomies and Threat Modelsp. 226
The Scope of the Insider Threat Prediction Specification Languagep. 237
The Domain Specific Language Programming Paradigmp. 240
Conclusionp. 242
Referencesp. 242
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program