Insider threat : a guide to understanding, detecting, and defending against the enemy from within /

Detailing the measures that organizations can implement to ensure high-impact quick wins, this in-depth book looks beyond perimeter protection tools, and shows how a security culture based on international best practice can help mitigate the insider threat to your security. --

Saved in:
Bibliographic Details
Main Author: Mehan, Julie E. (Author)
Format: Electronic eBook
Language:English
Published: Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2016.
Subjects:
Online Access: Full text (Emmanuel users only)
Table of Contents:
  • Cover
  • Title
  • Copyright
  • Preface
  • About the Author
  • Acknowledgements
  • Contents
  • Introduction
  • Chapter 1: The Hidden Threat
  • Why The Insider Threat is Called 'The Hidden Threat'
  • Defining the Insider
  • Insider Threat Has Many Forms
  • Chapter 2: Insider Threat Models and Indicators
  • The Bricks and Mortar Insider
  • Hard Copy-Based Insider
  • The Transitional Insider
  • Bits and Bytes Insider
  • Behavior Traits and Patterns Associated with Insider Threat
  • Insider Motivations and Enablers
  • The Psychology of an Insider
  • The Snowden Case
  • Organizational Characteristics and Insider Threat
  • The Life Stages of the Insider Threat
  • The Radicalized Insider Threat
  • A Note of Caution
  • Privacy and Ethical Concerns
  • Chapter 3: The Unintentional Insider Threat
  • Social Engineering
  • The Careless UIT
  • Social Media and the UIT
  • Chapter 4: Insider Threat, Big Data and the Cloud
  • Cloud Computing
  • Big Data
  • Cloud Computing & Big Data Insider Threat Concerns
  • FedRAMP
  • US Efforts to Secure the Cloud against Insider Threat
  • Chapter 5: Regional Perspectives on Insider Threat
  • Regional Perspectives
  • Different Views on Insider Threat
  • Chapter 6: Best Practices, Controls and Quick Wins
  • Policy and Strategic Initiatives
  • Training and Awareness
  • Personnel Security and Management
  • Prevention and Deterrence
  • Reaction, Response, and Recovery
  • Insider Threat 'Worst Practices'
  • Chapter 7: Final Thoughts
  • End Notes
  • ITG Resources.