咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Data Protection from Insider T... 收藏

Data Protection from Insider Threats

丛 书 名:Synthesis Lectures on Data Management

版本说明:1

作     者:Elisa Bertino 

I S B N:(纸本) 9783031007620 

出 版 社:Springer Cham 

出 版 年:1000年

页      数:XIII, 77页

主 题 词:Information Systems and Communication Service Data Structures and Information Theory 

摘      要:As data represent a key asset for today s organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques -- such as firewalls and network security tools -- are unable to protect data from attacks posed by those working on an organization s inside. These insiders usually have authorized access to relevant information systems, making it extremely challenging to block the misuse of information while still allowing them to do their jobs. This book discusses several techniques that can provide effective protection against attacks posed by people working on the inside of an organization. Chapter One introduces the notion of insider threat and reports some data about data breaches due to insider threats. Chapter Two covers authentication and access control techniques, and Chapter Three shows how these general security techniques can be extended and used in the context of protection from insider threats. Chapter Four addresses anomaly detection techniques that are used to determine anomalies in data accesses by insiders. These anomalies are often indicative of potential insider data attacks and therefore play an important role in protection from these attacks. Security information and event management (SIEM) tools and fine-grained auditing are discussed in Chapter Five. These tools aim at collecting, analyzing, and correlating -- in real-time -- any information and event that may be relevant for the security of an organization. As such, they can be a key element in finding a solution to such undesirable insider threats. Chapter Six goes on to provide a survey of techniques for separation-of-duty (SoD). SoD is an important principle that, when implemented in systems and tools, can strengthen data protection from malicious insiders. However, to date, very few approaches have be

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分