메뉴 건너뛰기




Volumn 6, Issue 1, 2008, Pages 61-64

Combating the insider cyber threat

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER-BASED TRAINING SYSTEMS; POTENTIAL RISKS;

EID: 38949103680     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2008.8     Document Type: Article
Times cited : (79)

References (12)
  • 1
    • 38949196301 scopus 로고    scopus 로고
    • DoD Office of the Inspector General, DoD Management of Information Assurance Efforts to Protect Automated Information Systems, tech. report no. PO 97-049, US Dept. of Defense, Sept. 1997.
    • DoD Office of the Inspector General, DoD Management of Information Assurance Efforts to Protect Automated Information Systems, tech. report no. PO 97-049, US Dept. of Defense, Sept. 1997.
  • 2
    • 2342472285 scopus 로고    scopus 로고
    • Constructivism: The Career and Technical Education Perspective
    • P.E. Doolittle and W.G. Camp, "Constructivism: The Career and Technical Education Perspective," J. Vocational and Technical Education, vol. 16, no. 1, 1999; http://scholar.lib.vt.edu/ejouruals/JVTE/ v16n1/doolittle.html.
    • (1999) J. Vocational and Technical Education , vol.16 , Issue.1
    • Doolittle, P.E.1    Camp, W.G.2
  • 3
    • 38949106468 scopus 로고    scopus 로고
    • F.L. Greitzer, D.J. Pond, and M. Jannotta, Scenario-Based Training on Human Errors Contributing to Security Incidents, Proc. Interservice/Industry Training, Simulation, and Education Conf. (I/IT-SEC 04), 2004; http://ntsa.metapress.com/app/home/contribution.asp?referrer= parent&backto=issue,130,174;journal,4,8;linkingpublicatiouresults,1:113340, 1.
    • F.L. Greitzer, D.J. Pond, and M. Jannotta, "Scenario-Based Training on Human Errors Contributing to Security Incidents," Proc. Interservice/Industry Training, Simulation, and Education Conf. (I/IT-SEC 04), 2004; http://ntsa.metapress.com/app/home/contribution.asp?referrer= parent&backto=issue,130,174;journal,4,8;linkingpublicatiouresults,1:113340, 1.
  • 4
    • 38949168753 scopus 로고    scopus 로고
    • Learning to Pull the Thread: Application of Guided-Discovery Principles to the Inquiry Process
    • I/ ITSEC 05
    • F.L. Greitzer et al., "Learning to Pull the Thread: Application of Guided-Discovery Principles to the Inquiry Process," Proc. Interservice/Industry Training, Simulation, and Education Conf. (I/ ITSEC 05), 2005;www.simsysinc.com/IITSEC/ED2005.htm#_Toc118714554.
    • (2005) Proc. Interservice/Industry Training, Simulation, and Education Conf
    • Greitzer, F.L.1
  • 5
    • 36448952741 scopus 로고    scopus 로고
    • F.L. Greitzer, O.A. Kuchar, and K. Huston, Cognitive Science Implications for Enhancing Training Effectiveness in a Serious Gaming Context, ACM J. Educational Resources in Computing, 7, no. 3, Article 2, August 2007; http://portal.acm.org/citation.cfm?id=1281320. 1281322&coll=&dl=ACM&idx=J814&part=journal&WantType= Journals&-title= Journal%20ou%20Educational%20Resources%20in%20Computing%20(JERIC).
    • F.L. Greitzer, O.A. Kuchar, and K. Huston, "Cognitive Science Implications for Enhancing Training Effectiveness in a Serious Gaming Context," ACM J. Educational Resources in Computing, vol. 7, no. 3, Article 2, August 2007; http://portal.acm.org/citation.cfm?id=1281320. 1281322&coll=&dl=ACM&idx=J814&part=journal&WantType= Journals&-title= Journal%20ou%20Educational%20Resources%20in%20Computing%20(JERIC).
  • 6
    • 38949180891 scopus 로고    scopus 로고
    • Predictive Adaptive Classification Model for Analysis and Notification: Internal Threat
    • PNNL-16713, Pacific Northwest National Lab, 2007
    • F.L. Greitzer et al., Predictive Adaptive Classification Model for Analysis and Notification: Internal Threat, tech. report PNNL-16713, Pacific Northwest National Lab., 2007.
    • tech. report
    • Greitzer, F.L.1
  • 7
    • 27844543023 scopus 로고    scopus 로고
    • Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors
    • U.S. Secret Service and Carnegie Mellon Univ, Software Eng. Inst
    • M. Keeney et al., Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors, tech. report, U.S. Secret Service and Carnegie Mellon Univ., Software Eng. Inst., 2005; www.secretservice.gov/ntac/ its_report_050516.pdf.
    • (2005) tech. report
    • Keeney, M.1
  • 8
    • 38949200175 scopus 로고    scopus 로고
    • M.R. Randazzo et al., Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector, tech. report no. CME/SEI-2004-TR-021, Carnegie Mellon Univ., Software Eng. Inst., 2004; www.sei.cmu.edu/publications/ documents/04.reports/04tr021.html.
    • M.R. Randazzo et al., Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector, tech. report no. CME/SEI-2004-TR-021, Carnegie Mellon Univ., Software Eng. Inst., 2004; www.sei.cmu.edu/publications/ documents/04.reports/04tr021.html.
  • 9
    • 38949092810 scopus 로고    scopus 로고
    • Proc. 25th Conf. System Dynamics Soc
    • The System Dynamics Society
    • A.P. Moore et al., "An Experience Using System Dynamics Modeling to Facilitate an Insider Threat Workshop," Proc. 25th Conf. System Dynamics Soc., The System Dynamics Society, 2007; www.cert.org/archive/pdf/ISDC2007. pdf.
    • (2007)
    • Moore, A.P.1
  • 10
    • 38949109248 scopus 로고    scopus 로고
    • S.R. Band et al., Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis, tech. report CMU/SEI-2006-TR-026, Carnegie-Mellon Univ., Software Eng. Inst., 2006.
    • S.R. Band et al., Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis, tech. report CMU/SEI-2006-TR-026, Carnegie-Mellon Univ., Software Eng. Inst., 2006.
  • 12
    • 84886931577 scopus 로고    scopus 로고
    • Management and Education of the Risk of Insider Threat (MERIT): System Dynamics Modeling of Computer System Sabotage
    • The System Dynamics Society
    • D. Cappelli et al., "Management and Education of the Risk of Insider Threat (MERIT): System Dynamics Modeling of Computer System Sabotage," Proc. 24th Conf. System Dynamics Soc., The System Dynamics Society, 2006; www.cert.org/archive/pdf/merit.pdf.
    • (2006) Proc. 24th Conf. System Dynamics Soc
    • Cappelli, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.