Inicio > > Seguridad informática > Insider Threat
Insider Threat

Insider Threat

Insider Threat

Julie E Mehan

63,88 €
IVA incluido
Disponible
Editorial:
IT Governance Publishing
Año de edición:
2016
Materia
Seguridad informática
ISBN:
9781849288392
63,88 €
IVA incluido
Disponible
Añadir a favoritos

Every type of organisation is vulnerable to insider abuse, errors or malicious attacks. These can impact reputation, operations and profitability, and expose data, harm the organisation, or deliver valuable intellectual property into competitors’ hands. Insiders can be current or former employees, contractors, or other business partners who have been granted authorised access to networks, systems or data, and all of them can bypass security measures through legitimate means. Product overview Insider Threat – A Guide to Understanding, Detecting, and Defending Against the Enemy from Within looks beyond perimeter protection tools, and shows how a security culture based on international best practice can help mitigate the insider threat to your security. It also provides some short-term quick fixes that can be applied as your organisations builds an effective insider threat programme. Read this book to learn: The seven organisational characteristics common to insider threat victims. The ten stages of a malicious attack. The ten steps of a successful insider threat programme. How to construct a three-tier security culture, encompassing artefacts, values and shared assumptions. Insider Threat details the measures that organisations can implement to ensure high-impact quick wins, mapping appropriate security controls from the ISO 27001, ISO 27002, and NIST SP 800-53 standards to the following points, and more: Risk mitigation and the eight steps of a risk assessment The importance of training and awareness, and conducting staff background screening Monitoring and auditing the activities of general and privileged users, and quickly responding to suspicious behaviours Metrics to measure insider threat behaviour and mitigation The challenge of external or temporary insiders (such as consultants, support contractors, partners, service providers, temporary employees) Layering physical and digital defences to provide defence in depth The importance of conducting regular penetration testing to evaluate security controls Limiting, monitoring and controlling remote access and mobile device use Ensuring supply-chain security Maintaining an incident management capability It also sets out what not to do, listing a set of worst practices that should be avoided. The insider threat comes in many forms. Insider Threat is the most in-depth guide to help you prepare for them. Order your copy today. About the author Dr Julie Mehan is the founder and president of JEMStone Strategies and a principal in a strategic consulting firm in Virginia. She has delivered cyber security and related privacy services to senior commercial, Department of Defense and federal government clients working in Italy, Australia, Canada, Belgium and the United States. Dr Mehan is also an associate professor at the University of Maryland University College, specialising in courses in cybersecurity, cyberterror, IT in organisations, and ethics in an Internet society.

Artículos relacionados

  • Information Security and Ethics
    Quigley
    ...
    Disponible

    105,56 €

  • Cybersecurity Fundamentals Explained
    Brian Mackay
    The issue of Cybersecurity is of paramount importance in the digital age. With near-continuous revelations about incidents and breaches in the media, organizations and individuals are faced with the challenge of finding the balance between risk, innovation, and cost. At the same time, the field of cybersecurity is undergoing dramatic changes, demanding that organizations embrac...
    Disponible

    28,22 €

  • Cybersecurity for Everyone
    Edward Franklin
    'Cybersecurity for Everyone' is a user-friendly and accessible guide that teaches the fundamentals of cybersecurity and provides practical tips, tricks, and tools for enhancing online security and privacy. From identifying and avoiding phishing attacks to preventing malware infections and ransomware attacks, this book equips readers with the knowledge and skills needed to prote...
    Disponible

    104,22 €

  • Improving Security, Privacy, and Trust in Cloud Computing
    Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud’s scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of chall...
    Disponible

    347,29 €

  • Enhancing Performance, Efficiency, and Security Through Complex Systems Control
    Academic scholars and professionals in engineering strive to enhance the performance, efficiency, and security of complex systems, but accessing comprehensive resources for these challenges can be daunting. Enhancing Performance, Efficiency, and Security Through Complex Systems Control offers an ideal solution. Edited by esteemed academics Idriss Chana, Aziz Bouazi, and Hussain...
    Disponible

    393,27 €

  • Cybersecurity for Everyone (Hardcover Edition)
    Edward Franklin
    'Cybersecurity for Everyone' is a user-friendly and accessible guide that teaches the fundamentals of cybersecurity and provides practical tips, tricks, and tools for enhancing online security and privacy. From identifying and avoiding phishing attacks to preventing malware infections and ransomware attacks, this book equips readers with the knowledge and skills needed to prote...
    Disponible

    102,87 €