Franqueira et al., 2010 - Google Patents
External insider threat: A real security challenge in enterprise value websFranqueira et al., 2010
View PDF- Document ID
- 15146237982609624954
- Author
- Franqueira V
- Wieringa R
- van Cleeff A
- van Eck P
- Publication year
- Publication venue
- 2010 International Conference on Availability, Reliability and Security
External Links
Snippet
Increasingly, organizations collaborate with other organizations in value webs with various arrangements, such as outsourcing, partnering, joint ventures, or subcontracting. As the Jericho Forum (an industry consortium of the Open Group) observed, in all these forms of …
- 230000006399 behavior 0 description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/102—Entity profiles
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Homoliak et al. | Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures | |
| Hunker et al. | Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques. | |
| Greitzer et al. | Combining traditional cyber security audit data with psychosocial data: towards predictive modeling for insider threat mitigation | |
| Elifoglu et al. | Minimizing insider threat risk with behavioral monitoring | |
| Sarkar | Assessing insider threats to information security using technical, behavioural and organisational measures | |
| Bishop et al. | We have met the enemy and he is us | |
| Stanton et al. | The visible employee: using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust | |
| Bishop et al. | A risk management approach to the “insider threat” | |
| Yeng et al. | Observational measures for effective profiling of healthcare staffs' security practices | |
| Franqueira et al. | External insider threat: A real security challenge in enterprise value webs | |
| Fagade et al. | M alicious Insider Threat Detection: A Conceptual M odel | |
| Furnell et al. | A conceptual architecture for real‐time intrusion monitoring | |
| Benedict | An Appraisal of Database Security in a Business Organization (Case Study: Fintrak Software Company Limited) | |
| Best et al. | Machine‐independent audit trail analysis—a tool for continuous audit assurance | |
| Goel et al. | Al-Driven Privacy Audits in Adversarial Settings | |
| Chu | Evaluating The Financial Impact of Data Breaches Involving Account Credentials | |
| Flynn et al. | Cloud service provider methods for managing insider threats: Analysis phase 2, expanded analysis and recommendations | |
| Mills | The current state of insider threat awareness and readiness in corporate cyber security-an analysis of definitions, prevention, detection and mitigation | |
| A. L et al. | Information security insider threats in organizations and mitigation techniques | |
| Gross Jr | Insider Threats | |
| Alshehhi et al. | Scenario intelligence: Modeling insider threats for effective anomaly detection using real life scenarios | |
| Wood | Socio-technical Security: User Behaviour, Profiling and Modelling and Privacy by Design | |
| Niemann | Enterprise architecture management and its role in IT governance and IT investment planning | |
| Idensohn et al. | Financial insider threats: a cybersecurity STRIDE analysis. | |
| Rakhi et al. | Insider Threat Detection and Prevention: New Approaches and Tools |