Data Protection from Insider Threats PDF (Adobe DRM) download by Elisa Bertino

Data Protection from Insider Threats

Morgan & Claypool Publishers
Publication date: September 2012
ISBN: 9781608457694
Digital Book format: PDF (Adobe DRM)


List price:
Our price:

You save: $2.01 (6%)
As data represents a key asset, organizations increasingly face the problem of protecting data from theft and misuse. Even though several data security techniques are available to protect data and computing infrastructures, many techniques, such as firewalls and network security tools, are unable to protect data from attacks by an organizations' insiders. Insiders are usually users who have authorized access to the organization information systems and therefore protecting data from these users is challenging. This lecture discusses several techniques that can provide effective protection against attacks by insiders. The lecture, after introducing the notion of insider threat and reporting some data about data breaches due to insider threats, covers authentication and access control techniques. The lecture shows how these general security techniques can be extended and used in the context of protection from insider threats. The lecture then covers anomaly detection techniques that are used to determine anomalies in data accesses by insiders. These anomalies are often indicative of potential insider data attacks and therefore play an important role in protection from these attacks. Then the lecture briefly discusses security information and event management (SIEM) tools, as well as fine-grained auditing. These tools aim at collecting, analyzing, and correlating in real-time any information and event that may be relevant for the security of an organization. As such, they can be a key element in solutions for protection from insider threats. Such discussion is followed by a survey of techniques for separation-of-duty (SoD). SoD is an important principle that when implemented in systems and tools can strengthen data protection from malicious insiders. However, to date, very few approaches have been proposed to implement SoD in systems. Finally the lecture provides a short survey of a commercial product that provides different techniques for protection from malicious users with system privileges, such as database administrator (DBA) in database management systems. Protecting against such insiders is particularly challenging as they have a lot of privileges and are also technically skilled users. Throughout the lecture, research issues and research directions are pointed. The lecture is concluded by a few remarks and additional research directions.
Please sign in to review this product.
Data Protection from Insider Threats PDF (Adobe DRM) can be read on any device that can open PDF (Adobe DRM) files.

File Size:
2020 Kb
Copy From Text:
Other books by Elisa Bertino
Digital Forensic Science: Issues, Methods, and Challenges PDF (Adobe DRM) download by Elisa Bertino
Digital Forensic Science: Issues, Methods, and Challenges
Elisa Bertino & Vassil Roussev & Ravi Sandhu
Morgan & Claypool Publishers, December 2016
ISBN: 9781627059596
Format: PDF
List Price: $40.00 Our price: $37.99