-
2
-
-
48249109086
-
A knowledge-based bayesian model for analyzing a system after an insider attack
-
ed. S. Jajodia, P. Samarati and S. Cimato. Springer Boston
-
Althebyan, Q., and B. Panda. 2008. A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack. In Proceedings of The IFIP TC 11 23rd International Information Security Conference, ed. S. Jajodia, P. Samarati and S. Cimato, 557-571. Springer Boston.
-
(2008)
Proceedings of the IFIP TC 11 23rd International Information Security Conference
, pp. 557-571
-
-
Althebyan, Q.1
Panda, B.2
-
3
-
-
70149090395
-
-
CERT Program and SoftwareE ngineering Institute
-
Band, S., D. M. Cappelli, L. Fischer, A. Moore, E. D. Shaw, and R. Trzeciak. 2006. Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis. CERT Program and SoftwareE ngineering Institute.
-
(2006)
Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis
-
-
Band, S.1
Cappelli, D.M.2
Fischer, L.3
Moore, A.4
Shaw, E.D.5
Trzeciak, R.6
-
4
-
-
84857948002
-
The insider attack problem nature and scope
-
ed. S. J. Stolfo, S. M. Bellovin, A. D. Keromytis, S. Hershkop, S. W. Smith and S. Sinclair. Springer US
-
Bellovin, S. M. 2008. The Insider Attack Problem Nature and Scope. In Insider Attack and Cyber Security, ed. S. J. Stolfo, S. M. Bellovin, A. D. Keromytis, S. Hershkop, S. W. Smith and S. Sinclair, 1-4. Springer US.
-
(2008)
Insider Attack and Cyber Security
, pp. 1-4
-
-
Bellovin, S.M.1
-
5
-
-
2342598277
-
Computer security impaired by legitimate users
-
Besnard, D., and B. Arief. 2004. Computer Security Impaired by Legitimate Users.Computers & Security 23 (3): 253-264.
-
(2004)
Computers & Security
, vol.23
, Issue.3
, pp. 253-264
-
-
Besnard, D.1
Arief, B.2
-
6
-
-
77950556924
-
We have met the enemy and he is us
-
Lake Tahoe, California, USA
-
Bishop, M., S. Engle, S. Peisert, S. Whalen, and C. Gates. 2008. We have met the enemy and he is us. InP roceedings of the 2008 workshop on new security paradigms Lake Tahoe, California, USA.
-
(2008)
Proceedings of the 2008 Workshop on New Security Paradigms
-
-
Bishop, M.1
Engle, S.2
Peisert, S.3
Whalen, S.4
Gates, C.5
-
10
-
-
51249123658
-
-
CERT Program, Software Engineering Institute and CyLab
-
Cappelli, D., A. Moore, R. Trzeciak, and T. Shimeall. 2009. Common Sense Guide to Prevention and Detection of Insider Threats - Version 3.1. CERT Program, Software Engineering Institute and CyLab.
-
(2009)
Common Sense Guide to Prevention and Detection of Insider Threats - Version 3. 1
-
-
Cappelli, D.1
Moore, A.2
Trzeciak, R.3
Shimeall, T.4
-
11
-
-
27544447707
-
Towards a theory of insider threat assessment
-
Washington, DC. IEEE Computer Society
-
Chinchani, R., A. Iyer, H. Ngo, and S. Upadhyaya. 2005 Towards a theory of insider threat assessment. In IEEE International Conference. Washington, DC. IEEE Computer Society
-
(2005)
IEEE International Conference
-
-
Chinchani, R.1
Iyer, A.2
Ngo, H.3
Upadhyaya, S.4
-
12
-
-
84857982693
-
The new cyber gang - A real threat profile
-
Cohen, F. 2001. The New Cyber Gang - A Real Threat Profile.N etwork Security 2001 (5): 15-17.
-
(2001)
N Etwork Security
, vol.2001
, Issue.5
, pp. 15-17
-
-
Cohen, F.1
-
14
-
-
84855851700
-
Human factors in information security: The insider threat - Who can you trust these days?
-
In Press, Corrected Proof
-
Colwill, C. 2010. Human factors in information security: The insider threat - Who can you trust these days? Information Security Technical Report In Press, Corrected Proof
-
(2010)
Information Security Technical Report
-
-
Colwill, C.1
-
15
-
-
34250765327
-
Insider threat monitoring is enhanced by asset relevance
-
Contos, B. 2007. Insider threat monitoring is enhanced by asset relevance.Infosecurity 4 (2): 47-47.
-
(2007)
Infosecurity
, vol.4
, Issue.2
, pp. 47-47
-
-
Contos, B.1
-
16
-
-
57649102137
-
Assessing the insider-outsider threat' duality in the context of the development of public-private partnerships delivering choice' in healthcare services: A sociomaterial critique
-
Crinson, I. 2008. Assessing the insider-outsider threat' duality in the context of the development of public-private partnerships delivering choice' in healthcare services: A sociomaterial critique.I nformation Security Technical Report 13 (4): 202-206.
-
(2008)
I Nformation Security Technical Report
, vol.13
, Issue.4
, pp. 202-206
-
-
Crinson, I.1
-
17
-
-
51549105272
-
You're only human
-
Dallaway, E. 2008. You're only human. Infosecurity 5 (6): 7-7.
-
(2008)
Infosecurity
, vol.5
, Issue.6
, pp. 7-7
-
-
Dallaway, E.1
-
19
-
-
3142683286
-
Enemies within: The problem of insider attacks
-
Furnell, S. 2004. Enemies within: the problem of insider attacks.Computer Fraud & Security 2004 (7): 6-11.
-
(2004)
Computer Fraud & Security
, vol.2004
, Issue.7
, pp. 6-11
-
-
Furnell, S.1
-
20
-
-
33749469542
-
Malicious or misinformed? Exploring a contributor to the insider threat
-
Furnell, S. 2006. Malicious or misinformed? Exploring a contributor to the insider threat.Computer Fraud & Security 2006 (9): 8-12.
-
(2006)
Computer Fraud & Security
, vol.2006
, Issue.9
, pp. 8-12
-
-
Furnell, S.1
-
21
-
-
40749094831
-
Addressing the insider threat
-
Fyffe, G. 2008. Addressing the insider threat. Network Security 2008 (3): 11-14.
-
(2008)
Network Security
, vol.2008
, Issue.3
, pp. 11-14
-
-
Fyffe, G.1
-
23
-
-
80052850317
-
-
CERT Program and Software Engineering Institute
-
Hanley, M., T. Dean, W. Schroeder, M. Houy, R. Trzeciak, and J. Montelibano. 2011. An Analysis of Technical Observations in Insider Theft of Intellectual Property Cases. CERT Program and Software Engineering Institute.
-
(2011)
An Analysis of Technical Observations in Insider Theft of Intellectual Property Cases
-
-
Hanley, M.1
Dean, T.2
Schroeder, W.3
Houy, M.4
Trzeciak, R.5
Montelibano, J.6
-
26
-
-
0011432676
-
Deficiencies of the traditional approach to information security and the requirements for a new methodology
-
Hitchings, J. 1995. Deficiencies of the traditional approach to information security and the requirements for a new methodology. Computers & Security 14 (5): 377-383.
-
(1995)
Computers & Security
, vol.14
, Issue.5
, pp. 377-383
-
-
Hitchings, J.1
-
27
-
-
84857936760
-
Behavorial parameters of trustworthiness for countering insider threats
-
Ho, S. M. 2008. Behavorial parameters of trustworthiness for countering insider threats. In The Third Annual iConference.
-
(2008)
The Third Annual IConference
-
-
Ho, S.M.1
-
29
-
-
27844543023
-
-
CERT Program and Software Engineering Institute
-
Keeney, M., D. Cappelli, E. Kowalski, A. Moore, T. Shimeall, and S. Rogers. 2005. Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors. CERT Program and Software Engineering Institute.
-
(2005)
Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors
-
-
Keeney, M.1
Cappelli, D.2
Kowalski, E.3
Moore, A.4
Shimeall, T.5
Rogers, S.6
-
30
-
-
21244441178
-
Barbarians inside the gates: Addressing internal security threats
-
Kemp, M. 2005. Barbarians inside the gates: addressing internal security threats. Network Security 2005 (6): 11-13.
-
(2005)
Network Security
, vol.2005
, Issue.6
, pp. 11-13
-
-
Kemp, M.1
-
32
-
-
67650355861
-
-
U.S. Secret Service and CERT/SEI
-
Kowalski, E., T. Conway, S. Keverline, M. Williams, D. Cappelli, B. Willke, and A. Moore. 2008. Insider Threat Study: Illicit Cyber Activity in the Government Sector. U.S. Secret Service and CERT/SEI.
-
(2008)
Insider Threat Study: Illicit Cyber Activity in the Government Sector
-
-
Kowalski, E.1
Conway, T.2
Keverline, S.3
Williams, M.4
Cappelli, D.5
Willke, B.6
Moore, A.7
-
34
-
-
70350366164
-
Mitigating inadvertent insider threats with incentives
-
ed. R. Dingledine and P. Golle. Springer Berlin / Heidelberg
-
Liu, D., X. Wang, and L. Camp. 2009. Mitigating Inadvertent Insider Threats with Incentives. In Financial Cryptography and Data Security, ed. R. Dingledine and P. Golle, 1-16. Springer Berlin / Heidelberg.
-
(2009)
Financial Cryptography and Data Security
, pp. 1-16
-
-
Liu, D.1
Wang, X.2
Camp, L.3
-
35
-
-
0036173202
-
Insider threat prediction tool: Evaluating the probability of IT misuse
-
Magklaras, G. B., and S. M. Furnell. 2001. Insider Threat Prediction Tool: Evaluating the probability of IT misuse. Computers & Security 21 (1): 62-73.
-
(2001)
Computers & Security
, vol.21
, Issue.1
, pp. 62-73
-
-
Magklaras, G.B.1
Furnell, S.M.2
-
36
-
-
24344460927
-
A preliminary model of end user sophistication for insider threat prediction in IT systems
-
Magklaras, G. B., and S. M. Furnell. 2005. A preliminary model of end user sophistication for insider threat prediction in IT systems. Computers & Security 24 (5): 371-380.
-
(2005)
Computers & Security
, vol.24
, Issue.5
, pp. 371-380
-
-
Magklaras, G.B.1
Furnell, S.M.2
-
37
-
-
43149107471
-
A behavioral theory of insider threat risks: A system dynamics approach
-
Martinez-Moyano, I., E. Rich, S. Conrad, D. Andersen, and T. Stewart. 2008. A behavioral theory of insider threat risks: a system dynamics approach. ACM Transactions on Modeling and Computer Simulation 18 (2): 1-27.
-
(2008)
ACM Transactions on Modeling and Computer Simulation
, vol.18
, Issue.2
, pp. 1-27
-
-
Martinez-Moyano, I.1
Rich, E.2
Conrad, S.3
Andersen, D.4
Stewart, T.5
-
38
-
-
51449110013
-
Toward a generic model of security in an organizational context: Exploring insider threats to information infrastructure
-
Hawaii, USA. IEEE Xplore
-
Martinez-Moyano, I., M. Samsa, J. Burke, and B. Akcam. 2008. Toward a generic model of security in an organizational context: exploring insider threats to information infrastructure. In Proceedings of the 41st Hawaii International Conference on System Sciences. Hawaii, USA. IEEE Xplore.
-
(2008)
Proceedings of the 41st Hawaii International Conference on System Sciences
-
-
Martinez-Moyano, I.1
Samsa, M.2
Burke, J.3
Akcam, B.4
-
39
-
-
84874936170
-
-
CERT Program, Software Engineering Institute and CyLab at Carnegie Mellon University
-
Moore, A., D. Cappelli, T. Caron, E. Shaw, and R. Trzeciak. 2009. Insider Theft of Intellectual Property for Business Advantage: A Preliminary Model. CERT Program, Software Engineering Institute and CyLab at Carnegie Mellon University.
-
(2009)
Insider Theft of Intellectual Property for Business Advantage: A Preliminary Model
-
-
Moore, A.1
Cappelli, D.2
Caron, T.3
Shaw, E.4
Trzeciak, R.5
-
41
-
-
28844434096
-
Criminal profiling and insider cyber crime
-
Nykodym, N., R. Taylor, and J. Vilela. 2005. Criminal profiling and insider cyber crime. Digital Investigation 2 (4): 261-267.
-
(2005)
Digital Investigation
, vol.2
, Issue.4
, pp. 261-267
-
-
Nykodym, N.1
Taylor, R.2
Vilela, J.3
-
42
-
-
34047201737
-
Using PLSI-U to detect insider threats from email traffic
-
ed. M. Olivier and S. Shenoi. Springer Boston
-
Okolica, J., G. Peterson, and R. Mills. 2006. Using PLSI-U To Detect Insider Threats from Email Traffic. In Advances in Digital Forensics II, ed. M. Olivier and S. Shenoi, 91-103. Springer Boston.
-
(2006)
Advances in Digital Forensics
, vol.2
, pp. 91-103
-
-
Okolica, J.1
Peterson, G.2
Mills, R.3
-
43
-
-
84857501902
-
Reflections on the insider threat
-
ed. S. J. Stolfo, S. M. Bellovin, A. D. Keromytis, S. Hershkop, S. W. Smith and S. Sinclair. Springer US
-
Pfleeger, C. P. 2008. Reflections on the Insider Threat. In Insider Attack and Cyber Security, ed. S. J. Stolfo, S. M. Bellovin, A. D. Keromytis, S. Hershkop, S. W. Smith and S. Sinclair, 5-16. Springer US.
-
(2008)
Insider Attack and Cyber Security
, pp. 5-16
-
-
Pfleeger, C.P.1
-
44
-
-
21644453410
-
Security policies to mitigate insider threat in the document control domain
-
Washington, DC, USA. IEEE Computer Society
-
Pramanik, S., V. Sankaranarayanan, and S. Upadhyaya. 2004. Security policies to mitigate insider threat in the document control domain. In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC'04). Washington, DC, USA. IEEE Computer Society
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC'04)
-
-
Pramanik, S.1
Sankaranarayanan, V.2
Upadhyaya, S.3
-
45
-
-
32644465248
-
-
U.S. Secret Service and CERT/SEI
-
Randazzo, M., M. Keeney, E. Kowalski, D. Cappelli, and A. Moore. 2004. Illicit Cyber Activity in the Banking and Finance Sector. U.S. Secret Service and CERT/SEI.
-
(2004)
Illicit Cyber Activity in the Banking and Finance Sector
-
-
Randazzo, M.1
Keeney, M.2
Kowalski, E.3
Cappelli, D.4
Moore, A.5
-
46
-
-
77956648928
-
Virtual battlefield
-
Royds, J. 2009. Virtual battlefield. CIR Magazine.
-
(2009)
CIR Magazine
-
-
Royds, J.1
-
47
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
Schultz, E. E. 2002. A framework for understanding and predicting insider attacks. Computers & Security 21 (6): 526-531.
-
(2002)
Computers & Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.E.1
-
48
-
-
0010886652
-
The insider threat to information systems1. The psychology of the dangerous insider
-
Shaw, E., K. G. Ruby, and J. M. Post. 2005. The insider threat to information systems1. the psychology of the dangerous insider. Security Awareness Bulletin, No. 2-98.
-
(2005)
Security Awareness Bulletin
, Issue.2-98
-
-
Shaw, E.1
Ruby, K.G.2
Post, J.M.3
-
49
-
-
33644904044
-
The role of behavioral research and profiling in malicious cyber insider investigations
-
Shaw, E. D. 2006. The role of behavioral research and profiling in malicious cyber insider investigations. Digital Investigation 3 (1): 20-31.
-
(2006)
Digital Investigation
, vol.3
, Issue.1
, pp. 20-31
-
-
Shaw, E.D.1
-
50
-
-
84857927448
-
-
CERT Program, Software Engineering Institute and CyLab
-
Spooner, D., D. Cappelli, A. Moore, and R. Trzeciak. 2009. Spotlight On: Insider Theft of Intellectual Property inside the U.S. Involving Foreign Governments or Organizations. CERT Program, Software Engineering Institute and CyLab.
-
(2009)
Spotlight On: Insider Theft of Intellectual Property Inside the U.S. Involving Foreign Governments or Organizations
-
-
Spooner, D.1
Cappelli, D.2
Moore, A.3
Trzeciak, R.4
-
51
-
-
57649220126
-
Practical management of malicious insider threat - An enterprise CSIRT perspective
-
Walker, T. 2008. Practical management of malicious insider threat - An enterprise CSIRT perspective. Information Security Technical Report 13 (4): 225-234.
-
(2008)
Information Security Technical Report
, vol.13
, Issue.4
, pp. 225-234
-
-
Walker, T.1
-
52
-
-
33751218304
-
Balancing the insider and outsider threat
-
Walton, R., and W.-M. Limited. 2006. Balancing the insider and outsider threat. Computer Fraud & Security 2006 (11): 8-11.
-
(2006)
Computer Fraud & Security
, vol.2006
, Issue.11
, pp. 8-11
-
-
Walton, R.1
Limited, W.-M.2
-
53
-
-
71549155293
-
Automatic identification of critical data items in a database to mitigate the effects of malicious insiders
-
ed. A. Prakash and I. Sen Gupta. Springer Berlin / Heidelberg
-
White, J., and B. Panda. 2009. Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders. In Information Systems Security, ed. A. Prakash and I. Sen Gupta, 208-221. Springer Berlin / Heidelberg.
-
(2009)
Information Systems Security
, pp. 208-221
-
-
White, J.1
Panda, B.2
|