語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Mitigating Insider Threat Risk.
~
Delosreyes, Garry C.
Mitigating Insider Threat Risk.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Mitigating Insider Threat Risk./
作者:
Delosreyes, Garry C.
面頁冊數:
1 online resource (46 pages)
附註:
Source: Masters Abstracts International, Volume: 57-02.
Contained By:
Masters Abstracts International57-02(E).
標題:
Information technology. -
電子資源:
click for full text (PQDT)
ISBN:
9780355513189
Mitigating Insider Threat Risk.
Delosreyes, Garry C.
Mitigating Insider Threat Risk.
- 1 online resource (46 pages)
Source: Masters Abstracts International, Volume: 57-02.
Thesis (M.S.)
Includes bibliographical references
Insider threats are a worldwide problem for every U.S. organizations and the government who is in charge of deterring, mitigating, and preventing it. Since most organizations today have the potential to be exposed to insider threats, the lack of organizational preparedness to prevent and mitigate is apparent. The purpose of this research was to examine the role of organizational preparedness in the detection and prevention of malicious activities and attacks perpetrated by insider threats. This research also highlights the motivations and characteristics of insider threats, the overall impact of insider threats to U.S. organizations, and the measures organizations should employ to mitigate the insider threat risk. There are many sources that can cultivate an insider, and documented behavioral signs are used to help mitigate the attack. Trust is the most valuable commodity that an organization can have, and proves to be the most important aspect in mitigating insider threat. The importance of this research paper will discuss the benefits of mitigating insider threat and the negative impacts that it can have on an organization's system security. The research has determined, despite laws, various physical and logical countermeasures, cyber security policies, insider threat is still a big problem. The lack of awareness and training provide the biggest deficiency in combating the threat. With the rising insider threat problem that includes high profile espionage cases involving trusted insiders and government contractor personnel, the call for implementing new industrial security requirements is needed.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355513189Subjects--Topical Terms:
559429
Information technology.
Index Terms--Genre/Form:
554714
Electronic books.
Mitigating Insider Threat Risk.
LDR
:02847ntm a2200361Ki 4500
001
909965
005
20180426091051.5
006
m o u
007
cr mn||||a|a||
008
190606s2017 xx obm 000 0 eng d
020
$a
9780355513189
035
$a
(MiAaPQ)AAI10686094
035
$a
(MiAaPQ)utica:11113
035
$a
AAI10686094
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
099
$a
TUL
$f
hyy
$c
available through World Wide Web
100
1
$a
Delosreyes, Garry C.
$3
1181003
245
1 0
$a
Mitigating Insider Threat Risk.
264
0
$c
2017
300
$a
1 online resource (46 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Masters Abstracts International, Volume: 57-02.
500
$a
Adviser: Jaclyn Giordano.
502
$a
Thesis (M.S.)
$c
Utica College
$d
2017.
504
$a
Includes bibliographical references
520
$a
Insider threats are a worldwide problem for every U.S. organizations and the government who is in charge of deterring, mitigating, and preventing it. Since most organizations today have the potential to be exposed to insider threats, the lack of organizational preparedness to prevent and mitigate is apparent. The purpose of this research was to examine the role of organizational preparedness in the detection and prevention of malicious activities and attacks perpetrated by insider threats. This research also highlights the motivations and characteristics of insider threats, the overall impact of insider threats to U.S. organizations, and the measures organizations should employ to mitigate the insider threat risk. There are many sources that can cultivate an insider, and documented behavioral signs are used to help mitigate the attack. Trust is the most valuable commodity that an organization can have, and proves to be the most important aspect in mitigating insider threat. The importance of this research paper will discuss the benefits of mitigating insider threat and the negative impacts that it can have on an organization's system security. The research has determined, despite laws, various physical and logical countermeasures, cyber security policies, insider threat is still a big problem. The lack of awareness and training provide the biggest deficiency in combating the threat. With the rising insider threat problem that includes high profile espionage cases involving trusted insiders and government contractor personnel, the call for implementing new industrial security requirements is needed.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Information technology.
$3
559429
650
4
$a
Computer science.
$3
573171
650
4
$a
Computer engineering.
$3
569006
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0489
690
$a
0984
690
$a
0464
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Utica College.
$b
Cybersecurity.
$3
1148527
773
0
$t
Masters Abstracts International
$g
57-02(E).
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10686094
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入