|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Clive BlackwellPublisher: IT Governance Publishing Imprint: IT Governance Publishing Dimensions: Width: 9.50cm , Height: 0.30cm , Length: 16.50cm Weight: 0.064kg ISBN: 9781849280105ISBN 10: 184928010 Pages: 60 Publication Date: 07 April 2009 Audience: General/trade , General Format: Paperback Publisher's Status: Out of Print Availability: Out of stock Table of Contents1 MODELLING THE INSIDER THREAT 2 1.1 WHAT IS THE INSIDER THREAT? 2 1.2 ARCHITECTURAL SECURITY MODEL 3 1.3 AN ATTACK CLASSIFICATION SCHEME 4 1.4 ATTACK SURFACE 4 1.5 IMPACT ZONE 6 1.6 SYSTEM HARDENING 6 1.7 TARGETING THE ATTACKER 8 2 INSIDER ATTACKS 10 2.1 INSIDER ATTACK CLASSIFICATION 10 2.2 DAMAGE 10 2.2.1 Methods of Attack 10 2.2.2 Defensive Protection 12 2.3 FRAUD 15 2.3.1 Methods of Attack 15 2.3.2 Defensive Protection 17 2.4 THEFT 18 2.4.1 Methods of Attack 18 2.4.2 Defensive Protection 20 2.5 CONCLUSIONS 22ReviewsAuthor InformationClive Blackwell is a researcher at Royal Holloway, University of London, where his main field is security architecture. He has developed a practical three-layer security architecture to model computer networks such as the Internet and other complex systems such as critical infrastructure. He is currently applying the model to the insider threat within different business sectors, which has resulted in several academic papers. Clive is a regular speaker on security at both academic and business conferences in the US and Europe as well as the UK. He has recently been invited to give talks on the insider threat at two major business conferences. Clive received a scholarship for his PhD in network security at Royal Holloway. It has the largest Information Security Group in the UK, and has more than 200 students from all over the world on its well-known MSc course. He holds a degree in Mathematics from Warwick University and in Computer Science from Royal Holloway where he passed out top of his class, and an MSc in Information Security also from Royal Holloway. He has about 20 publications to his name within the last two years. He also runs his own IT security consultancy, Advanced Computer Services, so he is aware of the security issues facing business. Tab Content 6Author Website:Countries AvailableAll regions |