메뉴 건너뛰기




Volumn 13, Issue 4, 2008, Pages 225-234

Practical management of malicious insider threat - An enterprise CSIRT perspective

Author keywords

[No Author keywords available]

Indexed keywords

COMMAND AND CONTROL SYSTEMS; ELECTRONIC WARFARE; INFORMATION SYSTEMS; INTERNATIONAL COOPERATION; MILITARY ELECTRONIC COUNTERMEASURES; SECURITY OF DATA; SECURITY SYSTEMS; SEMICONDUCTOR QUANTUM DOTS; TECHNOLOGY;

EID: 57649220126     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.istr.2008.10.013     Document Type: Article
Times cited : (11)

References (13)
  • 1
    • 57649216860 scopus 로고    scopus 로고
    • Anderson Robert H., Bozek Thomas, Longstaff Tom, Meitzler Wayne, Skroch Michael, Wyk Ken Van. Research on mitigating the insider threat to information systems - #2, RAND Conference Proceedings; 2000.
    • Anderson Robert H., Bozek Thomas, Longstaff Tom, Meitzler Wayne, Skroch Michael, Wyk Ken Van. Research on mitigating the insider threat to information systems - #2, RAND Conference Proceedings; 2000.
  • 2
    • 57649166089 scopus 로고    scopus 로고
    • Available from: (accessed October 2008)
    • Army Regulation 25-2 Information Assurance. Available from: (2003). https://ia.gordon.army.mil/docs/AR25_2.asp (accessed October 2008)
    • (2003) Army Regulation 25-2 Information Assurance
  • 3
    • 57649181329 scopus 로고    scopus 로고
    • Brackney Richard C., Anderson Robert H. Understanding the insider threat. In: Proceedings of a March 2004 Workshop, RAND; 2004.
    • Brackney Richard C., Anderson Robert H. Understanding the insider threat. In: Proceedings of a March 2004 Workshop, RAND; 2004.
  • 5
    • 57649192716 scopus 로고    scopus 로고
    • Custers Keith. C-Bits bvba, 2008.
    • Custers Keith. C-Bits bvba, 2008.
  • 6
    • 57649245170 scopus 로고    scopus 로고
    • Killcrece Georgia, Kossakowski Klaus-Peter, Ruefle Robin, Zajicek Mark. Organizational models for computer security incident response teams (CSIRTs), CMU/SEI-2003-HB-001; 2003.
    • Killcrece Georgia, Kossakowski Klaus-Peter, Ruefle Robin, Zajicek Mark. Organizational models for computer security incident response teams (CSIRTs), CMU/SEI-2003-HB-001; 2003.
  • 9
    • 57649200068 scopus 로고    scopus 로고
    • Maybury Mark. Detecting malicious insiders in military networks; 2006.
    • Maybury Mark. Detecting malicious insiders in military networks; 2006.
  • 10
    • 57649234489 scopus 로고    scopus 로고
    • Maybury M., Chase P., Cheiker B., Brackney D., Matzner S., Hetherington T., et al. Analysis and detection of malicious insiders; 2005.
    • Maybury M., Chase P., Cheiker B., Brackney D., Matzner S., Hetherington T., et al. Analysis and detection of malicious insiders; 2005.
  • 11
    • 57649239880 scopus 로고    scopus 로고
    • Nicolett Mark, Williams Amrit T., Proctor Paul E., Magic quadrant for security information and event management, 1H06 Gartner RAS Core Research Note G00139431, 12 May, 2006.
    • Nicolett Mark, Williams Amrit T., Proctor Paul E., Magic quadrant for security information and event management, 1H06 Gartner RAS Core Research Note G00139431, 12 May, 2006.
  • 12
    • 57649225033 scopus 로고    scopus 로고
    • Available from: (accessed October 2008)
    • NIST. Incident handling at BMDO. Available from: (2000). http://csrc.nist.gov/groups/SMA/fasp/documents/incident_response/BMDOInc Handling.htm (accessed October 2008)
    • (2000) Incident handling at BMDO
    • NIST1
  • 13
    • 57649200055 scopus 로고    scopus 로고
    • Shaw Eric D., Ruby Keven G., Post Jerrold M. The Insider threat to information, Appendix E in 2000, Research on mitigating the insider threat to information systems - #2, RAND Conference Proceedings; 2000.
    • Shaw Eric D., Ruby Keven G., Post Jerrold M. The Insider threat to information, Appendix E in 2000, Research on mitigating the insider threat to information systems - #2, RAND Conference Proceedings; 2000.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.