語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Behavioral Biometrics and the Inside...
~
Utica College.
Behavioral Biometrics and the Insider Threat.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Behavioral Biometrics and the Insider Threat./
作者:
Rash, Matthew.
面頁冊數:
1 online resource (60 pages)
附註:
Source: Masters Abstracts International, Volume: 56-04.
Contained By:
Masters Abstracts International56-04(E).
標題:
Criminology. -
電子資源:
click for full text (PQDT)
ISBN:
9781369757927
Behavioral Biometrics and the Insider Threat.
Rash, Matthew.
Behavioral Biometrics and the Insider Threat.
- 1 online resource (60 pages)
Source: Masters Abstracts International, Volume: 56-04.
Thesis (M.S.)
Includes bibliographical references
Insider attacks affect organizations globally and cost substantial time, money, trust, and customer confidence. They can be carried out by malicious insiders or unintentionally by accidental insiders. They are also exceptionally hard to detect and prevent. Current events, such as the leaks by NSA whistleblower Edward Snowden, highlight the risks that insider threats pose to organizations, including national governments. Stolen and abused credentials are two vectors used by insider attacks. Many recent breaches, including OPM in May 2015, were due to compromised passwords. Authentication schemes such as password, passphrase, and PIN codes are knowledge-based methods which are easy to hack and even easier for insiders to compromise. Furthermore, these authentication methods are single-point events not providing any additional user verification after an initial login. Behavioral-based biometrics, such as keystroke, mouse, and touch dynamics, can provide authentication systems based on who we are rather than what we know. Behavioral biometrics can be utilized in a continuous mode to verify a user actively throughout a session. This research project found that technologically, behavioral-based biometric systems can provide continuous user authentication with high levels of effectiveness. Although, the low number of academic studies utilizing real-world conditions highlights the need for additional large-scale case studies. A lack of industry standards for handling biometric data also underlines the low level of maturity of biometric-based systems. Additionally, privacy laws are divergent around the globe on the usage of biometric data. Laws even differ from state to state in the U.S. This lack of standardization makes litigation a high concern for organizations who might want to implement biometric systems.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9781369757927Subjects--Topical Terms:
563146
Criminology.
Index Terms--Genre/Form:
554714
Electronic books.
Behavioral Biometrics and the Insider Threat.
LDR
:03034ntm a2200337Ki 4500
001
911676
005
20180531091027.5
006
m o u
007
cr mn||||a|a||
008
190606s2017 xx obm 000 0 eng d
020
$a
9781369757927
035
$a
(MiAaPQ)AAI10273200
035
$a
(MiAaPQ)utica:10916
035
$a
AAI10273200
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
099
$a
TUL
$f
hyy
$c
available through World Wide Web
100
1
$a
Rash, Matthew.
$3
1183657
245
1 0
$a
Behavioral Biometrics and the Insider Threat.
264
0
$c
2017
300
$a
1 online resource (60 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Masters Abstracts International, Volume: 56-04.
500
$a
Adviser: Christopher M. Riddell.
502
$a
Thesis (M.S.)
$c
Utica College
$d
2017.
504
$a
Includes bibliographical references
520
$a
Insider attacks affect organizations globally and cost substantial time, money, trust, and customer confidence. They can be carried out by malicious insiders or unintentionally by accidental insiders. They are also exceptionally hard to detect and prevent. Current events, such as the leaks by NSA whistleblower Edward Snowden, highlight the risks that insider threats pose to organizations, including national governments. Stolen and abused credentials are two vectors used by insider attacks. Many recent breaches, including OPM in May 2015, were due to compromised passwords. Authentication schemes such as password, passphrase, and PIN codes are knowledge-based methods which are easy to hack and even easier for insiders to compromise. Furthermore, these authentication methods are single-point events not providing any additional user verification after an initial login. Behavioral-based biometrics, such as keystroke, mouse, and touch dynamics, can provide authentication systems based on who we are rather than what we know. Behavioral biometrics can be utilized in a continuous mode to verify a user actively throughout a session. This research project found that technologically, behavioral-based biometric systems can provide continuous user authentication with high levels of effectiveness. Although, the low number of academic studies utilizing real-world conditions highlights the need for additional large-scale case studies. A lack of industry standards for handling biometric data also underlines the low level of maturity of biometric-based systems. Additionally, privacy laws are divergent around the globe on the usage of biometric data. Laws even differ from state to state in the U.S. This lack of standardization makes litigation a high concern for organizations who might want to implement biometric systems.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Criminology.
$3
563146
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0627
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Utica College.
$b
Cybersecurity.
$3
1148527
773
0
$t
Masters Abstracts International
$g
56-04(E).
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10273200
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入