Insider threat : a guide to understanding, detecting, and defending against the enemy from within /
Detailing the measures that organizations can implement to ensure high-impact quick wins, this in-depth book looks beyond perimeter protection tools, and shows how a security culture based on international best practice can help mitigate the insider threat to your security. --
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Ely, Cambridgeshire, United Kingdom :
IT Governance Publishing,
2016.
|
Subjects: | |
Online Access: |
Full text (Emmanuel users only) |
Table of Contents:
- Cover
- Title
- Copyright
- Preface
- About the Author
- Acknowledgements
- Contents
- Introduction
- Chapter 1: The Hidden Threat
- Why The Insider Threat is Called 'The Hidden Threat'
- Defining the Insider
- Insider Threat Has Many Forms
- Chapter 2: Insider Threat Models and Indicators
- The Bricks and Mortar Insider
- Hard Copy-Based Insider
- The Transitional Insider
- Bits and Bytes Insider
- Behavior Traits and Patterns Associated with Insider Threat
- Insider Motivations and Enablers
- The Psychology of an Insider
- The Snowden Case
- Organizational Characteristics and Insider Threat
- The Life Stages of the Insider Threat
- The Radicalized Insider Threat
- A Note of Caution
- Privacy and Ethical Concerns
- Chapter 3: The Unintentional Insider Threat
- Social Engineering
- The Careless UIT
- Social Media and the UIT
- Chapter 4: Insider Threat, Big Data and the Cloud
- Cloud Computing
- Big Data
- Cloud Computing & Big Data Insider Threat Concerns
- FedRAMP
- US Efforts to Secure the Cloud against Insider Threat
- Chapter 5: Regional Perspectives on Insider Threat
- Regional Perspectives
- Different Views on Insider Threat
- Chapter 6: Best Practices, Controls and Quick Wins
- Policy and Strategic Initiatives
- Training and Awareness
- Personnel Security and Management
- Prevention and Deterrence
- Reaction, Response, and Recovery
- Insider Threat 'Worst Practices'
- Chapter 7: Final Thoughts
- End Notes
- ITG Resources.