Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Data Protection from Insider Threats

Best Price (Coupon Required):
Buy Data Protection from Insider Threats for $27.00 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

2 Offers Price Range: $29.99 - $35.00
BEST PRICE

Single Product Purchase

$27.00
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$29.99 $29.99

10% OFF
This deals requires coupon
$27.00
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783031007620
Condition
New
Product Description

As data represent a key asset for today's organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations' minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques -- such as firewalls and network security tools -- are unable to protect data from attacks posed by those working on an organization's "inside." These "insiders" usually have authorized access to relevant information systems, making it extremely challenging to block the misuse of information while still allowing them to do their jobs. This book discusses several techniques that can provide effective protection against attacks posed by people working on the inside of an organization. Chapter One introduces the notion of insider threat and reports some data about data breaches due to insider threats. Chapter Two covers authentication and access control techniques, and Chapter Three shows how these general security techniques can be extended and used in the context of protection from insider threats. Chapter Four addresses anomaly detection techniques that are used to determine anomalies in data accesses by insiders. These anomalies are often indicative of potential insider data attacks and therefore play an important role in protection from these attacks. Security information and event management (SIEM) tools and fine-grained auditing are discussed in Chapter Five. These tools aim at collecting, analyzing, and correlating -- in real-time -- any information and event that may be relevant for the security of an organization. As such, they can be a key element in finding a solution to such undesirable insider threats. Chapter Six goes on to provide a survey of techniques for separation-of-duty (SoD). SoD is an important principle that, when implemented in systems and tools, can strengthen data protection from malicious insiders. However, to date, very few approaches have been proposed for implementing SoD in systems. In Chapter Seven, a short survey of a commercial product is presented, which provides different techniques for protection from malicious users with system privileges -- such as a DBA in database management systems. Finally, in Chapter Eight, the book concludes with a few remarks and additional research directions. Table of Contents: Introduction / Authentication / Access Control / Anomaly Detection / Security Information and Event Management and Auditing / Separation of Duty / Case Study: Oracle Database Vault / Conclusion.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Transactions on Pattern Languages of Programming III

Transactions on Pattern Languages of Programming III

$72.00
21st Century Challenges in Chemical Crystallography II

21st Century Challenges in Chemical Crystallography II

$329.99
Absence and Memory in Colonial American Theatre

Absence and Memory in Colonial American Theatre

$54.99
Feminist Art in Resistance

Feminist Art in Resistance

$139.99
Architektur zeichnen

Architektur zeichnen

$69.99
System Modeling and Optimization XX

System Modeling and Optimization XX

$109.99
Agile Processes in Software Engineering and Extreme Programming

Agile Processes in Software Engineering and Extreme Programming

$39.99
Die literarische Utopie

Die literarische Utopie

$29.99
A Review and Annotated Bibliography of Family Business Studies

A Review and Annotated Bibliography of Family Business Studies

$169.99
Progress in Botany

Progress in Botany

$329.99
Elektrische Energieerzeugung

Elektrische Energieerzeugung

$69.99
VR/AR and 3D Displays

VR/AR and 3D Displays

$54.99
Die Vitalfrbung voller Zellsfte und ihre cytochemische Interpretation

Die Vitalfrbung voller Zellsfte und ihre cytochemische Interpretation

$59.99
Faith Traditions and Sustainability

Faith Traditions and Sustainability

$179.99
The Mathematical Apparatus for Quantum-Theories

The Mathematical Apparatus for Quantum-Theories

$69.99
Theorie des Entrepreneurship

Theorie des Entrepreneurship

$74.99
Decolonising Blue Spaces in the Anthropocene

Decolonising Blue Spaces in the Anthropocene

$59.99
Potential Therapeutic Applications of Nano-antioxidants

Potential Therapeutic Applications of Nano-antioxidants

$129.99
Emotionale Intelligenz und Verkaufsperformance

Emotionale Intelligenz und Verkaufsperformance

$64.99
Childhood and Nation

Childhood and Nation

$54.99
Biochemical, Pharmacological, and Clinical Aspects of Nitric Oxide

Biochemical, Pharmacological, and Clinical Aspects of Nitric Oxide

$39.99
Die Nomographie oder Fluchtlinienkunst

Die Nomographie oder Fluchtlinienkunst

$59.99
Dickens and the Italians in 'Pictures from Italy'

Dickens and the Italians in 'Pictures from Italy'

$39.99
The Lattice Dynamics and Statics of Alkali Halide Crystals

The Lattice Dynamics and Statics of Alkali Halide Crystals

$39.99
HYPERID  Die hybride Methodologie fr Projektmanagement und Produktentwicklung

HYPERID Die hybride Methodologie fr Projektmanagement und Produktentwicklung

$39.99
uglingkrankheiten

uglingkrankheiten

$44.99
Quantum Gravitation

Quantum Gravitation

$109.99
Proceedings of the 5th International Conference on Sustainable Civil Engineering Structures and Cons

Proceedings of the 5th International Conference on Sustainable Civil Engineering Structures and Cons

$329.99
Proceedings of the International Conference on Artificial Intelligence and Computer Vision (AICV2020

Proceedings of the International Conference on Artificial Intelligence and Computer Vision (AICV2020

$219.99
The History of the Arts Council of Northern Ireland, 19432016

The History of the Arts Council of Northern Ireland, 19432016

$84.99
Elementar-Mathematik

Elementar-Mathematik

$59.99
Der Vorstandsassistent

Der Vorstandsassistent

$59.99
Das steuerlich optimale Haus- und Wohnungseigentum

Das steuerlich optimale Haus- und Wohnungseigentum

$59.99
Recent Developments in Mercury Science

Recent Developments in Mercury Science

$259.00
Global Strategic Trade Management

Global Strategic Trade Management

$99.00
Space Supporting Africa

Space Supporting Africa

$84.99
A Short Course on Topological Insulators

A Short Course on Topological Insulators

$49.99
Guided Reading Level P Pack 3

Guided Reading Level P Pack 3

$75.00
Setting Up Joint Ventures in China

Setting Up Joint Ventures in China

$54.99
Singular Differential and Integral Equations with Applications

Singular Differential and Integral Equations with Applications

$109.99
previous
next