메뉴 건너뛰기




Volumn , Issue , 2011, Pages

A pattern for increased monitoring for intellectual property theft by departing insiders

Author keywords

Cyber security; Enterprise architecture; Information assurance; Information security; Insider threat; Organizational pattern; Security pattern

Indexed keywords

INDUSTRY; INTELLECTUAL PROPERTY; SECURITY OF DATA;

EID: 84899847671     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2578903.2579157     Document Type: Conference Paper
Times cited : (4)

References (8)
  • 4
    • 84899842694 scopus 로고    scopus 로고
    • Candidate technical controls and indicators of insider attack from socio-technical models and data
    • November
    • Hanley, M. "Candidate Technical Controls and Indicators of Insider Attack from Socio-Technical Models and Data." Proceedings of the 2010 NSA CAE Workshop on Insider Threat, November 2010.
    • (2010) Proceedings of the 2010 NSA CAE Workshop on Insider Threat
    • Hanley, S.1
  • 7
    • 84899813940 scopus 로고    scopus 로고
    • A Pattern for trust trap mitigation
    • NIST Special Publication 800-53, "Recommended Security Controls for Federal Information Systems and Organizations," Revision 3, August
    • Mundie, D.A. and Moore, A.P., "A Pattern for Trust Trap Mitigation," Proceedings of the 2011 Conference on Pattern Languages for Programs, forthcoming. NIST Special Publication 800-53, "Recommended Security Controls for Federal Information Systems and Organizations," Revision 3, August 2009. http://csrc.nist.gov/publications/nistpubs/800-53-Rev3/ sp800-53-rev3-final.pdf
    • (2009) Proceedings of the 2011 Conference on Pattern Languages for Programs, Forthcoming
    • Mundie, A.D.1    Moore, A.P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.