000 | 06037nam a2200685 i 4500 | ||
---|---|---|---|
001 | 6813487 | ||
003 | IEEE | ||
005 | 20200413152906.0 | ||
006 | m eo d | ||
007 | cr cn |||m|||a | ||
008 | 120714s2012 caua foab 000 0 eng d | ||
020 | _a9781608457694 (electronic bk.) | ||
020 | _z9781608457687 (pbk.) | ||
024 | 7 |
_a10.2200/S00431ED1V01Y201207DTM028 _2doi |
|
035 | _a(OCoLC)799363515 | ||
035 | _a(CaBNVSL)swl00401085 | ||
040 |
_aCaBNVSL _cCaBNVSL _dCaBNVSL |
||
050 | 4 |
_aQA76.9.A25 _bB473 2012 |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 | _aBertino, Elisa. | |
245 | 1 | 0 |
_aData protection from insider threats _h[electronic resource] / _cElisa Bertino. |
260 |
_aSan Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) : _bMorgan & Claypool, _cc2012. |
||
300 |
_a1 electronic text (xiii, 77 p.) : _bill., digital file. |
||
490 | 1 |
_aSynthesis lectures on data management, _x2153-5426 ; _v# 28 |
|
538 | _aMode of access: World Wide Web. | ||
538 | _aSystem requirements: Adobe Acrobat Reader. | ||
500 | _aPart of: Synthesis digital library of engineering and computer science. | ||
500 | _aSeries from website. | ||
504 | _aIncludes bibliographical references (p. 69-75). | ||
505 | 0 | _aAcknowledgments -- 1. Introduction -- 1.1 A definition of insider threat -- 1.2 Some data about insider attacks -- 1.3 Overview of the lecture -- | |
505 | 8 | _a2. Authentication -- 2.1 The auth-SL system, a system for flexible, policy-based authentication -- 2.2 Continuous authentication -- 2.3 Research directions -- | |
505 | 8 | _a3. Access control -- 3.1 Access control concepts and models -- 3.2 Content-based access control -- 3.3 Time-based access control -- 3.4 Location-based access control -- 3.5 Purpose-based access control -- 3.6 Usage control -- 3.7 Tools for authoring and managing access control policies -- 3.8 Research directions -- | |
505 | 8 | _a4. Anomaly detection -- 4.1 Syntax-based anomaly detection -- 4.2 Data-based anomaly detection -- 4.3 Anomaly response systems -- 4.4 Research directions -- | |
505 | 8 | _a5. Security information and event management and auditing -- 5.1 Components of a SIEM tool -- 5.2 Fine-grained auditing -- 5.3 Research directions -- | |
505 | 8 | _a6. Separation of duty -- 6.1 SoD for workflow systems, the BFA model -- 6.2 The joint threshold administration model -- 6.3 Proximity location constraints -- 6.4 Research directions -- | |
505 | 8 | _a7. Case study, Oracle database vault -- 7.1 Realms -- 7.2 Rule sets -- 7.3 Command rules -- 7.4 Multi-factor authorization -- 7.5 Separation of duty -- 7.6 Concluding remarks -- | |
505 | 8 | _a8. Conclusion -- Bibliography -- Author's biography. | |
506 | 1 | _aAbstract freely available; full-text restricted to subscribers or individual document purchasers. | |
510 | 0 | _aCompendex | |
510 | 0 | _aINSPEC | |
510 | 0 | _aGoogle scholar | |
510 | 0 | _aGoogle book search | |
520 | 3 | _aAs data represent a key asset for today's organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations' minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques--such as firewalls and network security tools--are unable to protect data from attacks posed by those working on an organization's "inside." These "insiders" usually have authorized access to relevant information systems, making it extremely challenging to block the misuse of information while still allowing them to do their jobs. This book discusses several techniques that can provide effective protection against attacks posed by people working on the inside of an organization. Chapter 1 introduces the notion of insider threat and reports some data about data breaches due to insider threats. Chapter 2 covers authentication and access control techniques, and Chapter 3 shows how these general security techniques can be extended and used in the context of protection from insider threats. Chapter 4 addresses anomaly detection techniques that are used to determine anomalies in data accesses by insiders. These anomalies are often indicative of potential insider data attacks and therefore play an important role in protection from these attacks. Security information and event management (SIEM) tools and fine-grained auditing are discussed in Chapter 5. These tools aim at collecting, analyzing, and correlating--in real-time--any information and event that may be relevant for the security of an organization. As such, they can be a key element in finding a solution to such undesirable insider threats. Chapter 6 goes on to provide a survey of techniques for separation-of-duty (SoD). SoD is an important principle that, when implemented in systems and tools, can strengthen data protection from malicious insiders. However, to date, very few approaches have been proposed for implementing SoD in systems. In Chapter 7, a short survey of a commercial product is presented, which provides different techniques for protection from malicious users with system privileges--such as a DBA in database management systems. Finally, in Chapter 8, the book concludes with a few remarks and additional research directions. | |
530 | _aAlso available in print. | ||
588 | _aTitle from PDF t.p. (viewed on July 14, 2012). | ||
650 | 0 | _aData protection. | |
650 | 0 | _aInternal security. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aAnomaly detection (Computer security) | |
653 | _adata security | ||
653 | _adata privacy | ||
653 | _aauthentication | ||
653 | _aaccess control | ||
653 | _aanomaly detection | ||
653 | _aseparation of-duty | ||
776 | 0 | 8 |
_iPrint version: _z9781608457687 |
830 | 0 | _aSynthesis digital library of engineering and computer science. | |
830 | 0 |
_aSynthesis lectures on data management ; _v# 28. _x2153-5426 |
|
856 | 4 | 2 |
_3Abstract with links to resource _uhttp://ieeexplore.ieee.org/servlet/opac?bknumber=6813487 |
999 |
_c561920 _d561920 |