[go: up one dir, main page]

Franqueira et al., 2010 - Google Patents

External insider threat: A real security challenge in enterprise value webs

Franqueira et al., 2010

View PDF
Document ID
15146237982609624954
Author
Franqueira V
Wieringa R
van Cleeff A
van Eck P
Publication year
Publication venue
2010 International Conference on Availability, Reliability and Security

External Links

Snippet

Increasingly, organizations collaborate with other organizations in value webs with various arrangements, such as outsourcing, partnering, joint ventures, or subcontracting. As the Jericho Forum (an industry consortium of the Open Group) observed, in all these forms of …
Continue reading at research.utwente.nl (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Similar Documents

Publication Publication Date Title
Homoliak et al. Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures
Hunker et al. Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques.
Greitzer et al. Combining traditional cyber security audit data with psychosocial data: towards predictive modeling for insider threat mitigation
Elifoglu et al. Minimizing insider threat risk with behavioral monitoring
Sarkar Assessing insider threats to information security using technical, behavioural and organisational measures
Bishop et al. We have met the enemy and he is us
Stanton et al. The visible employee: using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust
Bishop et al. A risk management approach to the “insider threat”
Yeng et al. Observational measures for effective profiling of healthcare staffs' security practices
Franqueira et al. External insider threat: A real security challenge in enterprise value webs
Fagade et al. M alicious Insider Threat Detection: A Conceptual M odel
Furnell et al. A conceptual architecture for real‐time intrusion monitoring
Benedict An Appraisal of Database Security in a Business Organization (Case Study: Fintrak Software Company Limited)
Best et al. Machine‐independent audit trail analysis—a tool for continuous audit assurance
Goel et al. Al-Driven Privacy Audits in Adversarial Settings
Chu Evaluating The Financial Impact of Data Breaches Involving Account Credentials
Flynn et al. Cloud service provider methods for managing insider threats: Analysis phase 2, expanded analysis and recommendations
Mills The current state of insider threat awareness and readiness in corporate cyber security-an analysis of definitions, prevention, detection and mitigation
A. L et al. Information security insider threats in organizations and mitigation techniques
Gross Jr Insider Threats
Alshehhi et al. Scenario intelligence: Modeling insider threats for effective anomaly detection using real life scenarios
Wood Socio-technical Security: User Behaviour, Profiling and Modelling and Privacy by Design
Niemann Enterprise architecture management and its role in IT governance and IT investment planning
Idensohn et al. Financial insider threats: a cybersecurity STRIDE analysis.
Rakhi et al. Insider Threat Detection and Prevention: New Approaches and Tools