Data Protection from Insider Threats

Data Protection from Insider Threats

Elisa Bertino

50,97 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2012
Materia
Guías de Internet y servicios en línea
ISBN:
9783031007620
50,97 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

As data represent a key asset for today’s organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations’ minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques -- such as firewalls and network security tools -- are unable to protect data from attacks posed by those working on an organization’s 'inside.' These 'insiders' usually have authorized access to relevant information systems, making it extremely challenging to block the misuse of information while still allowing them to do their jobs. This book discusses several techniques that can provide effective protection against attacks posed by people working on the inside of an organization. Chapter One introduces the notion of insider threat and reports some data about data breaches due to insider threats. Chapter Two covers authentication and access control techniques, and Chapter Three shows how these general security techniques can be extended and used in the context of protection from insider threats. Chapter Four addresses anomaly detection techniques that are used to determine anomalies in data accesses by insiders. These anomalies are often indicative of potential insider data attacks and therefore play an important role in protection from these attacks. Security information and event management (SIEM) tools and fine-grained auditing are discussed in Chapter Five. These tools aim at collecting, analyzing, and correlating -- in real-time -- any information and event that may be relevant for the security of an organization. As such, they can be a key element in finding a solution to such undesirable insider threats. Chapter Six goes on to provide a survey of techniques for separation-of-duty (SoD). SoD is an important principle that, when implemented in systems and tools, can strengthen data protection from malicious insiders. However, to date, very few approaches have been proposed for implementing SoD in systems. In Chapter Seven, a short survey of a commercial product is presented, which provides different techniques for protection from malicious users with system privileges -- such as a DBA in database management systems. Finally, in Chapter Eight, the book concludes with a few remarks and additional research directions. Table of Contents: Introduction / Authentication / Access Control / Anomaly Detection / Security Information and Event Management and Auditing / Separation of Duty / Case Study: Oracle Database Vault / Conclusion

Artículos relacionados

  • Transformation of Knowledge, Information and Data
    Patrick Van Bommel
    ...
    Disponible

    112,09 €

  • Advanced Geospatial Practices in Natural Environment Resource Management
    Today, the relentless depletion of natural resources has reached a critical juncture, demanding innovative solutions. Advanced Geospatial Practices in Natural Environment Resource Management dives into the intricate tapestry of issues jeopardizing ecosystems. This book systematically dissects the fundamental drivers, traces the historical evolution, and elucidates the underlyin...
    Disponible

    360,33 €

  • Advanced Geospatial Practices in Natural Environment Resource Management
    Today, the relentless depletion of natural resources has reached a critical juncture, demanding innovative solutions. Advanced Geospatial Practices in Natural Environment Resource Management dives into the intricate tapestry of issues jeopardizing ecosystems. This book systematically dissects the fundamental drivers, traces the historical evolution, and elucidates the underlyin...
    Disponible

    274,88 €

  • Accelerate Model Training with PyTorch 2.X
    Maicon Melo Alves
    Dramatically accelerate the building process of complex models using PyTorch to extract the best performance from any computing environmentKey Features- Reduce the model-building time by applying optimization techniques and approaches- Harness the computing power of multiple devices and machines to boost the training process- Focus on model quality by quickly evaluating differe...
    Disponible

    61,39 €

  • Information Theory for Data Science
    Changho Suh
    Information theory deals with mathematical laws that govern the flow, representation and transmission of information, just as the field of physics concerns laws that govern the behavior of the physical universe. The foundation was made in the context of communication while characterizing the fundamental limits of communication and offering codes (sometimes called algorithms) to...
    Disponible

    194,78 €

  • Theory of Decision Under Uncertainty
    Itzhak Gilboa
    ...
    Disponible

    49,52 €

Otros libros del autor

  • Data Protection from Insider Threats
    Elisa Bertino
    As data represent a key asset for today’s organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations’ minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques -- such as firewalls and network security tools -- are unable to protect data...
    Disponible

    49,93 €

  • ECOOP 2000 - Object-Oriented Programming
    Elisa Bertino
    Following a 13-year tradition of excellence, the 14th ECOOP conference repeated the success of its predecessors. This excellence is certainly due to the level of maturity that object-oriented technology has reached, which warrants its use as a key paradigm in any computerized system. The principles of the object-oriented paradigm and the features of s...
    Disponible

    65,28 €