Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Data Protection from Insider Threats

Best Price (Coupon Required):
Buy Data Protection from Insider Threats for $27.00 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

2 Offers Price Range: $29.99 - $35.00
BEST PRICE

Single Product Purchase

$27.00
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$29.99 $29.99

10% OFF
This deals requires coupon
$27.00
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783031007620
Condition
New
Product Description

As data represent a key asset for today's organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations' minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques -- such as firewalls and network security tools -- are unable to protect data from attacks posed by those working on an organization's "inside." These "insiders" usually have authorized access to relevant information systems, making it extremely challenging to block the misuse of information while still allowing them to do their jobs. This book discusses several techniques that can provide effective protection against attacks posed by people working on the inside of an organization. Chapter One introduces the notion of insider threat and reports some data about data breaches due to insider threats. Chapter Two covers authentication and access control techniques, and Chapter Three shows how these general security techniques can be extended and used in the context of protection from insider threats. Chapter Four addresses anomaly detection techniques that are used to determine anomalies in data accesses by insiders. These anomalies are often indicative of potential insider data attacks and therefore play an important role in protection from these attacks. Security information and event management (SIEM) tools and fine-grained auditing are discussed in Chapter Five. These tools aim at collecting, analyzing, and correlating -- in real-time -- any information and event that may be relevant for the security of an organization. As such, they can be a key element in finding a solution to such undesirable insider threats. Chapter Six goes on to provide a survey of techniques for separation-of-duty (SoD). SoD is an important principle that, when implemented in systems and tools, can strengthen data protection from malicious insiders. However, to date, very few approaches have been proposed for implementing SoD in systems. In Chapter Seven, a short survey of a commercial product is presented, which provides different techniques for protection from malicious users with system privileges -- such as a DBA in database management systems. Finally, in Chapter Eight, the book concludes with a few remarks and additional research directions. Table of Contents: Introduction / Authentication / Access Control / Anomaly Detection / Security Information and Event Management and Auditing / Separation of Duty / Case Study: Oracle Database Vault / Conclusion.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Steroid Hormone Action and Cancer

Steroid Hormone Action and Cancer

$84.99
Japanization at Work

Japanization at Work

$19.99
Die Notfalltherapie und Intensivtherapie bei Schlaganfall

Die Notfalltherapie und Intensivtherapie bei Schlaganfall

$44.95
New Larkins for Old

New Larkins for Old

$109.99
International Impacts on Social Policy

International Impacts on Social Policy

$49.99
Service Availability

Service Availability

$39.99
Make Way For Ducklings

Make Way For Ducklings

$6.50
Soft Computing and Signal Processing

Soft Computing and Signal Processing

$189.00
Baryonic Processes in the Large-Scale Structuring of the Universe

Baryonic Processes in the Large-Scale Structuring of the Universe

$109.99
Global Trade and Trade Governance During De-Globalization

Global Trade and Trade Governance During De-Globalization

$109.99
The Theory of Stochastic Processes I

The Theory of Stochastic Processes I

$59.99
Bloody Sunday and the Rule of Law in Northern Ireland

Bloody Sunday and the Rule of Law in Northern Ireland

$56.00
Eigentumsschutz und Sozialversicherung

Eigentumsschutz und Sozialversicherung

$69.95
New Developments in Semiconductor Physics

New Developments in Semiconductor Physics

$39.99
Ambulatory Impedance Cardiography

Ambulatory Impedance Cardiography

$84.99
Plant Omics: Trends and Applications

Plant Omics: Trends and Applications

$219.99
Lexikon Medientheorie und Medienwissenschaft

Lexikon Medientheorie und Medienwissenschaft

$69.99
Batterien und Akkumulatoren

Batterien und Akkumulatoren

$74.99
The Prediction of Ionospheric Conditions

The Prediction of Ionospheric Conditions

$39.99
Market Microstructure and Nonlinear Dynamics

Market Microstructure and Nonlinear Dynamics

$139.99
Transport Processes in Porous Media

Transport Processes in Porous Media

$109.99
Advanced Numerical Modeling and Data Assimilation Techniques for Tropical Cyclone Predictions

Advanced Numerical Modeling and Data Assimilation Techniques for Tropical Cyclone Predictions

$169.99
Interpretationen der Modallogik

Interpretationen der Modallogik

$89.00
Wireless and Mobile Communications

Wireless and Mobile Communications

$129.00
Advancements of Grey Systems Theory in Economics and Social Sciences

Advancements of Grey Systems Theory in Economics and Social Sciences

$99.99
Catastrophe Insurance

Catastrophe Insurance

$84.99
Dynamics of First-Order Phase Transitions in Equilibrium and Nonequilibrium Systems

Dynamics of First-Order Phase Transitions in Equilibrium and Nonequilibrium Systems

$39.99
A Short Introduction to Intuitionistic Logic

A Short Introduction to Intuitionistic Logic

$119.00
Polysaccharide Shapes

Polysaccharide Shapes

$54.99
Theory of Electron Transport in Semiconductors

Theory of Electron Transport in Semiconductors

$259.00
Diffuser Stoffeintrag in Bden und Gewsser

Diffuser Stoffeintrag in Bden und Gewsser

$69.99
Static Dielectric Constants of Pure Liquids and Binary Liquid Mixtures

Static Dielectric Constants of Pure Liquids and Binary Liquid Mixtures

$549.99
Essential Illustrated Neurosurgery

Essential Illustrated Neurosurgery

$54.99
Learning-Through-Touring

Learning-Through-Touring

$49.99
Mechanisms in B-Cell Neoplasia

Mechanisms in B-Cell Neoplasia

$84.99
Norways Sovereign Wealth Fund

Norways Sovereign Wealth Fund

$119.99
New Directions in the Ethics of Assisted Suicide and Euthanasia

New Directions in the Ethics of Assisted Suicide and Euthanasia

$139.99
Die berpflanzung der Mnnlichen Keimdrse

Die berpflanzung der Mnnlichen Keimdrse

$59.99
Praxishandbuch Betriebsprfung im Sozialversicherungsrecht

Praxishandbuch Betriebsprfung im Sozialversicherungsrecht

$44.99
Text Mining with MATLAB

Text Mining with MATLAB

$119.99
previous
next