Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Data protection from insider threats (Record no. 561920)

000 -LEADER
fixed length control field 06037nam a2200685 i 4500
001 - CONTROL NUMBER
control field 6813487
003 - CONTROL NUMBER IDENTIFIER
control field IEEE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200413152906.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m eo d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn |||m|||a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120714s2012 caua foab 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781608457694 (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781608457687 (pbk.)
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.2200/S00431ED1V01Y201207DTM028
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)799363515
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)swl00401085
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number B473 2012
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Bertino, Elisa.
245 10 - TITLE STATEMENT
Title Data protection from insider threats
Medium [electronic resource] /
Statement of responsibility, etc. Elisa Bertino.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) :
Name of publisher, distributor, etc. Morgan & Claypool,
Date of publication, distribution, etc. c2012.
300 ## - PHYSICAL DESCRIPTION
Extent 1 electronic text (xiii, 77 p.) :
Other physical details ill., digital file.
490 1# - SERIES STATEMENT
Series statement Synthesis lectures on data management,
International Standard Serial Number 2153-5426 ;
Volume/sequential designation # 28
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
538 ## - SYSTEM DETAILS NOTE
System details note System requirements: Adobe Acrobat Reader.
500 ## - GENERAL NOTE
General note Part of: Synthesis digital library of engineering and computer science.
500 ## - GENERAL NOTE
General note Series from website.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (p. 69-75).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Acknowledgments -- 1. Introduction -- 1.1 A definition of insider threat -- 1.2 Some data about insider attacks -- 1.3 Overview of the lecture --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2. Authentication -- 2.1 The auth-SL system, a system for flexible, policy-based authentication -- 2.2 Continuous authentication -- 2.3 Research directions --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3. Access control -- 3.1 Access control concepts and models -- 3.2 Content-based access control -- 3.3 Time-based access control -- 3.4 Location-based access control -- 3.5 Purpose-based access control -- 3.6 Usage control -- 3.7 Tools for authoring and managing access control policies -- 3.8 Research directions --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4. Anomaly detection -- 4.1 Syntax-based anomaly detection -- 4.2 Data-based anomaly detection -- 4.3 Anomaly response systems -- 4.4 Research directions --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5. Security information and event management and auditing -- 5.1 Components of a SIEM tool -- 5.2 Fine-grained auditing -- 5.3 Research directions --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 6. Separation of duty -- 6.1 SoD for workflow systems, the BFA model -- 6.2 The joint threshold administration model -- 6.3 Proximity location constraints -- 6.4 Research directions --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 7. Case study, Oracle database vault -- 7.1 Realms -- 7.2 Rule sets -- 7.3 Command rules -- 7.4 Multi-factor authorization -- 7.5 Separation of duty -- 7.6 Concluding remarks --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 8. Conclusion -- Bibliography -- Author's biography.
506 1# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Abstract freely available; full-text restricted to subscribers or individual document purchasers.
510 0# - CITATION/REFERENCES NOTE
Name of source Compendex
510 0# - CITATION/REFERENCES NOTE
Name of source INSPEC
510 0# - CITATION/REFERENCES NOTE
Name of source Google scholar
510 0# - CITATION/REFERENCES NOTE
Name of source Google book search
520 3# - SUMMARY, ETC.
Summary, etc. As data represent a key asset for today's organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations' minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques--such as firewalls and network security tools--are unable to protect data from attacks posed by those working on an organization's "inside." These "insiders" usually have authorized access to relevant information systems, making it extremely challenging to block the misuse of information while still allowing them to do their jobs. This book discusses several techniques that can provide effective protection against attacks posed by people working on the inside of an organization. Chapter 1 introduces the notion of insider threat and reports some data about data breaches due to insider threats. Chapter 2 covers authentication and access control techniques, and Chapter 3 shows how these general security techniques can be extended and used in the context of protection from insider threats. Chapter 4 addresses anomaly detection techniques that are used to determine anomalies in data accesses by insiders. These anomalies are often indicative of potential insider data attacks and therefore play an important role in protection from these attacks. Security information and event management (SIEM) tools and fine-grained auditing are discussed in Chapter 5. These tools aim at collecting, analyzing, and correlating--in real-time--any information and event that may be relevant for the security of an organization. As such, they can be a key element in finding a solution to such undesirable insider threats. Chapter 6 goes on to provide a survey of techniques for separation-of-duty (SoD). SoD is an important principle that, when implemented in systems and tools, can strengthen data protection from malicious insiders. However, to date, very few approaches have been proposed for implementing SoD in systems. In Chapter 7, a short survey of a commercial product is presented, which provides different techniques for protection from malicious users with system privileges--such as a DBA in database management systems. Finally, in Chapter 8, the book concludes with a few remarks and additional research directions.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Title from PDF t.p. (viewed on July 14, 2012).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internal security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Anomaly detection (Computer security)
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term data security
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term data privacy
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term authentication
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term access control
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term anomaly detection
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term separation of-duty
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9781608457687
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis digital library of engineering and computer science.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis lectures on data management ;
Volume/sequential designation # 28.
International Standard Serial Number 2153-5426
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to resource
Uniform Resource Identifier http://ieeexplore.ieee.org/servlet/opac?bknumber=6813487
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Date acquired Barcode Date last seen Price effective from Koha item type
        PK Kelkar Library, IIT Kanpur PK Kelkar Library, IIT Kanpur 2020-04-13 EBKE420 2020-04-13 2020-04-13 E books

Powered by Koha