Compare Prices | Create Shopping Lists with Price Drop Alerts | Set Coupons, Promo Codes & Sales Alerts | Get Access to Exclusive Deals and Much More... All in One Place | Read all about it here

Data Protection from Insider Threats

Data Protection from Insider Threats

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783031007620
Condition
New
Product Description

As data represent a key asset for today's organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations' minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques -- such as firewalls and network security tools -- are unable to protect data from attacks posed by those working on an organization's "inside." These "insiders" usually have authorized access to relevant information systems, making it extremely challenging to block the misuse of information while still allowing them to do their jobs. This book discusses several techniques that can provide effective protection against attacks posed by people working on the inside of an organization. Chapter One introduces the notion of insider threat and reports some data about data breaches due to insider threats. Chapter Two covers authentication and access control techniques, and Chapter Three shows how these general security techniques can be extended and used in the context of protection from insider threats. Chapter Four addresses anomaly detection techniques that are used to determine anomalies in data accesses by insiders. These anomalies are often indicative of potential insider data attacks and therefore play an important role in protection from these attacks. Security information and event management (SIEM) tools and fine-grained auditing are discussed in Chapter Five. These tools aim at collecting, analyzing, and correlating -- in real-time -- any information and event that may be relevant for the security of an organization. As such, they can be a key element in finding a solution to such undesirable insider threats. Chapter Six goes on to provide a survey of techniques for separation-of-duty (SoD). SoD is an important principle that, when implemented in systems and tools, can strengthen data protection from malicious insiders. However, to date, very few approaches have been proposed for implementing SoD in systems. In Chapter Seven, a short survey of a commercial product is presented, which provides different techniques for protection from malicious users with system privileges -- such as a DBA in database management systems. Finally, in Chapter Eight, the book concludes with a few remarks and additional research directions. Table of Contents: Introduction / Authentication / Access Control / Anomaly Detection / Security Information and Event Management and Auditing / Separation of Duty / Case Study: Oracle Database Vault / Conclusion.

Available Colors
Available Sizes
2 Offers Price Range: $29.99 - $35.00
BEST PRICE

Single Product Purchase

$29.99
@ Link.springer.com     BUY Now

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
Contact Store Call Store Contact Support
$29.99 $29.99

$29.99
See Site In stock Visit Store

Similar Products

Kenneth W. Thompson, The Prophet of Norms

$54.99

Affirmative Intervention to Support Multispecies Relationships

$149.99

Management Innovation

$109.99

Handbuch Kostenrechnung

$54.99

Perspektiven filmischer berwindung der bipolaren Geschlechternorm durch Rekurs auf mythisches Poten

$54.99

Neuronale Modellierung der Sprachverarbeitung und des Sprachlernens

$74.99

Produktionsplanung und -steuerung in der chemischen Industrie

$64.99

Resilience and Recovery in Asian Disasters

$84.99

Care Loops and Mobilities in Nordic, Central, and Eastern European Welfare States

$129.99

Everest: The Summit

$5.99

Bindungsverlust und Zukunftsangst Leben in der Risikogesellschaft

$59.99

ber die Umsetzung von Aceton in Diacetonalkohol unter dem Einflu von Calciumhydroxyd

$54.99

Facial Kinship Verification

$54.99

French Caribbeans in Africa

$39.99

Employee Uncertainty Over Digital Transformation

$99.99

PASCAL

$59.99

Abstract Parabolic Evolution Equations and their Applications

$89.00

The Genera of Lactic Acid Bacteria

$129.00

Wissen vom Wasser

$49.99

Intelligenz testen und frdern

$34.99

The Theory and Practice of Social Machines

$169.99

Advances in Plant Biopesticides

$129.00

Census of the Galaxy: Challenges for Photometry and Spectrometry with GAIA

$109.99

Infinite-Dimensional Dynamical Systems in Mechanics and Physics

$79.99

Geometric Analysis and Nonlinear Partial Differential Equations

$109.99

Ecclesia II

$49.99

Peer-to-Peer Query Processing over Multidimensional Data

$54.99

Immune Infertility

$99.00

Japans Industrious Revolution

$54.99

Best Practices in Management Accounting

$119.99

Hearing-Impaired Students Intellectual Styles and Their Influence

$139.99

Hatchet: Brian's Hunt

$5.96

Sustainability Innovations in the Electricity Sector

$109.99

Enzyme

$59.99

Misspecification Analysis

$109.99

National Geographic Birder's Life List and Journal by National Geographic

$19.99

Corneal Regeneration

$109.00

Designing Reliable and Efficient Networks on Chips

$169.99

Gegenwartsprobleme staatlicher Anleihepolitik

$59.99

Terrorism and Violent Conflict

$39.99