Data Protection from Insider Threats PDF (Adobe DRM) download by Elisa Bertino

Data Protection from Insider Threats

Morgan & Claypool Publishers
Publication date: September 2012
ISBN: 9781608457694
Digital Book format: PDF (Adobe DRM)

Buy PDF

List price:
$35.00
Our price:
$32.99

You save: $2.01 (6%)
GET THIS EBOOK
FOR FREE!
Join our Facebook sweepstake, share and
get 10 likes. Winners
get notified in 24H!
As data represents a key asset, organizations increasingly face the problem of protecting data from theft and misuse. Even though several data security techniques are available to protect data and computing infrastructures, many techniques, such as firewalls and network security tools, are unable to protect data from attacks by an organizations' insiders. Insiders are usually users who have authorized access to the organization information systems and therefore protecting data from these users is challenging. This lecture discusses several techniques that can provide effective protection against attacks by insiders. The lecture, after introducing the notion of insider threat and reporting some data about data breaches due to insider threats, covers authentication and access control techniques. The lecture shows how these general security techniques can be extended and used in the context of protection from insider threats. The lecture then covers anomaly detection techniques that are used to determine anomalies in data accesses by insiders. These anomalies are often indicative of potential insider data attacks and therefore play an important role in protection from these attacks. Then the lecture briefly discusses security information and event management (SIEM) tools, as well as fine-grained auditing. These tools aim at collecting, analyzing, and correlating in real-time any information and event that may be relevant for the security of an organization. As such, they can be a key element in solutions for protection from insider threats. Such discussion is followed by a survey of techniques for separation-of-duty (SoD). SoD is an important principle that when implemented in systems and tools can strengthen data protection from malicious insiders. However, to date, very few approaches have been proposed to implement SoD in systems. Finally the lecture provides a short survey of a commercial product that provides different techniques for protection from malicious users with system privileges, such as database administrator (DBA) in database management systems. Protecting against such insiders is particularly challenging as they have a lot of privileges and are also technically skilled users. Throughout the lecture, research issues and research directions are pointed. The lecture is concluded by a few remarks and additional research directions.
Please sign in to review this product.
Format:
Devices:
Data Protection from Insider Threats PDF (Adobe DRM) can be read on any device that can open PDF (Adobe DRM) files.

File Size:
2020 Kb
Language:
ENG
Copy From Text:
Disabled.
Printing:
Disabled.
Other books by Elisa Bertino
RFID Security and Privacy PDF (Adobe DRM) download by Elisa Bertino
RFID Security and Privacy
Elisa Bertino & Robert Deng & Robert H. Deng & Yingjiu Li
Morgan & Claypool Publishers, December 2013
ISBN: 9781627053259
Format: PDF
List Price: $40.00 Our price: $37.99
Private Information Retrieval PDF (Adobe DRM) download by Elisa Bertino
Private Information Retrieval
Elisa Bertino & Rajat Subhra Chakraborty & Richira Naskar & Russell Paulet & Xuan Yi & Xun Yi
Morgan & Claypool Publishers, September 2013
ISBN: 9781627051538
Format: PDF
List Price: $40.00 Our price: $37.99
Identity Management: Concepts, Technologies, and Systems PDF (Adobe DRM) download by Elisa Bertino
Identity Management: Concepts, Technologies, and Systems
Elisa Bertino & Kenji Takahashi
Artech House, January 2011
ISBN: 9781608070398
Format: PDF
List Price: $99.00 Our price: $89.99