skip to content
The insider threat : combatting the enemy within Preview this item
ClosePreview this item
Checking...

The insider threat : combatting the enemy within

Author: Clive Blackwell
Publisher: Ely : IT Governance Pub., 2009.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
The insider threat poses a significant and increasing problem for organisations. The use of highly connected computers makes controlling information much more difficult than in the past. This new pocket guide intends to shed light on the key security issues facing organisations from insiders to get them up to speed quickly.
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Clive Blackwell
ISBN: 9781849280112 1849280118 184928010X 9781849280105
OCLC Number: 669758669
Description: 1 online resource
Contents: CHAPTER 1: MODELLING THE INSIDER THREAT; What is the insider threat?; Architectural security model; An attack classification scheme; Attack surface; Impact zone; System hardening; Targeting the attacker; CHAPTER 2: INSIDER ATTACKS; Insider attack classification; Damage; Defensive protection; Fraud; Theft; Conclusions; APPENDIX: FURTHER READING; ITG RESOURCES.
Other Titles: ITPro.
Responsibility: Clive Blackwell.

Abstract:

The insider threat poses a significant and increasing problem for organisations. The use of highly connected computers makes controlling information more difficult than in the past. This pocket guide  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/669758669> # The insider threat : combatting the enemy within
    a schema:CreativeWork, schema:MediaObject, schema:Book ;
    library:oclcnum "669758669" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/793938608#Place/ely> ; # Ely
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/enk> ;
    rdfs:seeAlso <http://experiment.worldcat.org/entity/work/data/793938608#CreativeWork/itpro> ; # ITPro.
    schema:about <http://dewey.info/class/005.8/e22/> ;
    schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/793938608#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
    schema:about <http://experiment.worldcat.org/entity/work/data/793938608#Topic/employee_crimes_prevention> ; # Employee crimes--Prevention
    schema:about <http://id.worldcat.org/fast/887958> ; # Data protection
    schema:about <http://id.worldcat.org/fast/908967> ; # Employee crimes--Prevention
    schema:about <http://experiment.worldcat.org/entity/work/data/793938608#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/793938608#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:bookFormat schema:EBook ;
    schema:creator <http://viaf.org/viaf/157374405> ; # Clive Blackwell
    schema:datePublished "2009" ;
    schema:description "CHAPTER 1: MODELLING THE INSIDER THREAT; What is the insider threat?; Architectural security model; An attack classification scheme; Attack surface; Impact zone; System hardening; Targeting the attacker; CHAPTER 2: INSIDER ATTACKS; Insider attack classification; Damage; Defensive protection; Fraud; Theft; Conclusions; APPENDIX: FURTHER READING; ITG RESOURCES."@en ;
    schema:description "The insider threat poses a significant and increasing problem for organisations. The use of highly connected computers makes controlling information much more difficult than in the past. This new pocket guide intends to shed light on the key security issues facing organisations from insiders to get them up to speed quickly."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/793938608> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/793938608#CreativeWork/> ;
    schema:name "The insider threat : combatting the enemy within"@en ;
    schema:productID "669758669" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/669758669#PublicationEvent/ely_it_governance_pub_2009> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/793938608#Agent/it_governance_pub> ; # IT Governance Pub.
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=480373> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391163> ;
    schema:url <http://www.myilibrary.com?id=238475> ;
    schema:url <http://ebookcentral.proquest.com/lib/columbia/detail.action?docID=480373> ;
    schema:url <http://ebookcentral.proquest.com/lib/warw/detail.action?docID=480373> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=34453> ;
    schema:url <http://www.jstor.org/stable/10.2307/j.ctt5hh7t8> ;
    schema:url <http://proquest.safaribooksonline.com/9781849280105> ;
    schema:url <https://grinnell.idm.oclc.org/login?url=http://www.jstor.org/stable/10.2307/j.ctt5hh7t8> ;
    schema:url <http://www.myilibrary.com?id=238475&ref=toc> ;
    schema:url <http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=480373> ;
    schema:url <http://site.ebrary.com/id/10439464> ;
    schema:workExample <http://worldcat.org/isbn/9781849280112> ;
    schema:workExample <http://worldcat.org/isbn/9781849280105> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/669758669> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/793938608#Agent/it_governance_pub> # IT Governance Pub.
    a bgn:Agent ;
    schema:name "IT Governance Pub." ;
    .

<http://experiment.worldcat.org/entity/work/data/793938608#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/793938608#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/793938608#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/887958> # Data protection
    a schema:Intangible ;
    schema:name "Data protection"@en ;
    .

<http://id.worldcat.org/fast/908967> # Employee crimes--Prevention
    a schema:Intangible ;
    schema:name "Employee crimes--Prevention"@en ;
    .

<http://viaf.org/viaf/157374405> # Clive Blackwell
    a schema:Person ;
    schema:familyName "Blackwell" ;
    schema:givenName "Clive" ;
    schema:name "Clive Blackwell" ;
    .

<http://worldcat.org/isbn/9781849280105>
    a schema:ProductModel ;
    schema:isbn "184928010X" ;
    schema:isbn "9781849280105" ;
    .

<http://worldcat.org/isbn/9781849280112>
    a schema:ProductModel ;
    schema:isbn "1849280118" ;
    schema:isbn "9781849280112" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.