Borrow it
- African Studies Library
- Alumni Medical Library
- Astronomy Library
- Fineman and Pappas Law Libraries
- Frederick S. Pardee Management Library
- Howard Gotlieb Archival Research Center
- Mugar Memorial Library
- Music Library
- Pikering Educational Resources Library
- School of Theology Library
- Science & Engineering Library
- Stone Science Library
The Resource Data protection from insider threats, Elisa Bertino, (electronic resource)
Data protection from insider threats, Elisa Bertino, (electronic resource)
Resource Information
The item Data protection from insider threats, Elisa Bertino, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.This item is available to borrow from all library branches.
Resource Information
The item Data protection from insider threats, Elisa Bertino, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.
This item is available to borrow from all library branches.
- Summary
- As data represent a key asset for today's organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations' minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques--such as firewalls and network security tools--are unable to protect data from attacks posed by those working on an organization's "inside." These "insiders" usually have authorized access to relevant information systems, making it extremely challenging to block the misuse of information while still allowing them to do their jobs. This book discusses several techniques that can provide effective protection against attacks posed by people working on the inside of an organization. Chapter 1 introduces the notion of insider threat and reports some data about data breaches due to insider threats. Chapter 2 covers authentication and access control techniques, and Chapter 3 shows how these general security techniques can be extended and used in the context of protection from insider threats. Chapter 4 addresses anomaly detection techniques that are used to determine anomalies in data accesses by insiders. These anomalies are often indicative of potential insider data attacks and therefore play an important role in protection from these attacks. Security information and event management (SIEM) tools and fine-grained auditing are discussed in Chapter 5. These tools aim at collecting, analyzing, and correlating--in real-time--any information and event that may be relevant for the security of an organization. As such, they can be a key element in finding a solution to such undesirable insider threats. Chapter 6 goes on to provide a survey of techniques for separation-of-duty (SoD). SoD is an important principle that, when implemented in systems and tools, can strengthen data protection from malicious insiders. However, to date, very few approaches have been proposed for implementing SoD in systems. In Chapter 7, a short survey of a commercial product is presented, which provides different techniques for protection from malicious users with system privileges--such as a DBA in database management systems. Finally, in Chapter 8, the book concludes with a few remarks and additional research directions
- Language
- eng
- Extent
- 1 online resource (xiii, 77 p.)
- Note
- Part of: Synthesis digital library of engineering and computer science
- Contents
-
- Acknowledgments -- 1. Introduction -- 1.1 A definition of insider threat -- 1.2 Some data about insider attacks -- 1.3 Overview of the lecture --
- 2. Authentication -- 2.1 The auth-SL system, a system for flexible, policy-based authentication -- 2.2 Continuous authentication -- 2.3 Research directions --
- 3. Access control -- 3.1 Access control concepts and models -- 3.2 Content-based access control -- 3.3 Time-based access control -- 3.4 Location-based access control -- 3.5 Purpose-based access control -- 3.6 Usage control -- 3.7 Tools for authoring and managing access control policies -- 3.8 Research directions --
- 4. Anomaly detection -- 4.1 Syntax-based anomaly detection -- 4.2 Data-based anomaly detection -- 4.3 Anomaly response systems -- 4.4 Research directions --
- 5. Security information and event management and auditing -- 5.1 Components of a SIEM tool -- 5.2 Fine-grained auditing -- 5.3 Research directions --
- 6. Separation of duty -- 6.1 SoD for workflow systems, the BFA model -- 6.2 The joint threshold administration model -- 6.3 Proximity location constraints -- 6.4 Research directions --
- 7. Case study, Oracle database vault -- 7.1 Realms -- 7.2 Rule sets -- 7.3 Command rules -- 7.4 Multi-factor authorization -- 7.5 Separation of duty -- 7.6 Concluding remarks --
- 8. Conclusion -- Bibliography -- Author's biography
- Isbn
- 9781608457694
- Label
- Data protection from insider threats
- Title
- Data protection from insider threats
- Statement of responsibility
- Elisa Bertino
- Subject
-
- Anomaly detection (Computer security)
- Anomaly detection (Computer security)
- Anomaly detection (Computer security)
- COMPUTERS / Internet / Security
- COMPUTERS / Networking / Security
- COMPUTERS / Security / General
- Computer security
- Computer security
- Computer security
- Computer security
- Data protection
- Data protection
- Data protection
- Data protection
- Electronic books
- Electronic books
- Internal security
- Internal security
- Internal security
- Internal security
- access control
- anomaly detection
- authentication
- data privacy
- data security
- separation of-duty
- Anomaly detection (Computer security)
- Language
- eng
- Summary
- As data represent a key asset for today's organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations' minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques--such as firewalls and network security tools--are unable to protect data from attacks posed by those working on an organization's "inside." These "insiders" usually have authorized access to relevant information systems, making it extremely challenging to block the misuse of information while still allowing them to do their jobs. This book discusses several techniques that can provide effective protection against attacks posed by people working on the inside of an organization. Chapter 1 introduces the notion of insider threat and reports some data about data breaches due to insider threats. Chapter 2 covers authentication and access control techniques, and Chapter 3 shows how these general security techniques can be extended and used in the context of protection from insider threats. Chapter 4 addresses anomaly detection techniques that are used to determine anomalies in data accesses by insiders. These anomalies are often indicative of potential insider data attacks and therefore play an important role in protection from these attacks. Security information and event management (SIEM) tools and fine-grained auditing are discussed in Chapter 5. These tools aim at collecting, analyzing, and correlating--in real-time--any information and event that may be relevant for the security of an organization. As such, they can be a key element in finding a solution to such undesirable insider threats. Chapter 6 goes on to provide a survey of techniques for separation-of-duty (SoD). SoD is an important principle that, when implemented in systems and tools, can strengthen data protection from malicious insiders. However, to date, very few approaches have been proposed for implementing SoD in systems. In Chapter 7, a short survey of a commercial product is presented, which provides different techniques for protection from malicious users with system privileges--such as a DBA in database management systems. Finally, in Chapter 8, the book concludes with a few remarks and additional research directions
- Cataloging source
- CaBNvSL
- Citation source
-
- Compendex
- INSPEC
- Google scholar
- Google book search
- http://library.link/vocab/creatorName
- Bertino, Elisa
- Illustrations
- illustrations
- Index
- no index present
- LC call number
- QA76.9.A25
- LC item number
- B473 2012
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
- ebrary
- Series statement
- Synthesis lectures on data management,
- Series volume
- #28
- http://library.link/vocab/subjectName
-
- Data protection
- Internal security
- Computer security
- Anomaly detection (Computer security)
- COMPUTERS / Internet / Security
- COMPUTERS / Networking / Security
- COMPUTERS / Security / General
- Anomaly detection (Computer security)
- Computer security
- Data protection
- Internal security
- Target audience
- specialized
- Label
- Data protection from insider threats, Elisa Bertino, (electronic resource)
- Note
- Part of: Synthesis digital library of engineering and computer science
- Bibliography note
- Includes bibliographical references (p. 69-75)
- Color
- multicolored
- Contents
-
- Acknowledgments -- 1. Introduction -- 1.1 A definition of insider threat -- 1.2 Some data about insider attacks -- 1.3 Overview of the lecture --
- 2. Authentication -- 2.1 The auth-SL system, a system for flexible, policy-based authentication -- 2.2 Continuous authentication -- 2.3 Research directions --
- 3. Access control -- 3.1 Access control concepts and models -- 3.2 Content-based access control -- 3.3 Time-based access control -- 3.4 Location-based access control -- 3.5 Purpose-based access control -- 3.6 Usage control -- 3.7 Tools for authoring and managing access control policies -- 3.8 Research directions --
- 4. Anomaly detection -- 4.1 Syntax-based anomaly detection -- 4.2 Data-based anomaly detection -- 4.3 Anomaly response systems -- 4.4 Research directions --
- 5. Security information and event management and auditing -- 5.1 Components of a SIEM tool -- 5.2 Fine-grained auditing -- 5.3 Research directions --
- 6. Separation of duty -- 6.1 SoD for workflow systems, the BFA model -- 6.2 The joint threshold administration model -- 6.3 Proximity location constraints -- 6.4 Research directions --
- 7. Case study, Oracle database vault -- 7.1 Realms -- 7.2 Rule sets -- 7.3 Command rules -- 7.4 Multi-factor authorization -- 7.5 Separation of duty -- 7.6 Concluding remarks --
- 8. Conclusion -- Bibliography -- Author's biography
- Dimensions
- unknown
- Extent
- 1 online resource (xiii, 77 p.)
- File format
- multiple file formats
- Form of item
- online
- Isbn
- 9781608457694
- Isbn Type
- (electronic bk.)
- Other control number
- 10.2200/S00431ED1V01Y201207DTM028
- Other physical details
- ill.
- Reformatting quality
- access
- Specific material designation
- remote
- Stock number
- CL0500000332
- System control number
-
- (OCoLC)799363515
- (OCoLC)ocn799363515
- Label
- Data protection from insider threats, Elisa Bertino, (electronic resource)
- Note
- Part of: Synthesis digital library of engineering and computer science
- Bibliography note
- Includes bibliographical references (p. 69-75)
- Color
- multicolored
- Contents
-
- Acknowledgments -- 1. Introduction -- 1.1 A definition of insider threat -- 1.2 Some data about insider attacks -- 1.3 Overview of the lecture --
- 2. Authentication -- 2.1 The auth-SL system, a system for flexible, policy-based authentication -- 2.2 Continuous authentication -- 2.3 Research directions --
- 3. Access control -- 3.1 Access control concepts and models -- 3.2 Content-based access control -- 3.3 Time-based access control -- 3.4 Location-based access control -- 3.5 Purpose-based access control -- 3.6 Usage control -- 3.7 Tools for authoring and managing access control policies -- 3.8 Research directions --
- 4. Anomaly detection -- 4.1 Syntax-based anomaly detection -- 4.2 Data-based anomaly detection -- 4.3 Anomaly response systems -- 4.4 Research directions --
- 5. Security information and event management and auditing -- 5.1 Components of a SIEM tool -- 5.2 Fine-grained auditing -- 5.3 Research directions --
- 6. Separation of duty -- 6.1 SoD for workflow systems, the BFA model -- 6.2 The joint threshold administration model -- 6.3 Proximity location constraints -- 6.4 Research directions --
- 7. Case study, Oracle database vault -- 7.1 Realms -- 7.2 Rule sets -- 7.3 Command rules -- 7.4 Multi-factor authorization -- 7.5 Separation of duty -- 7.6 Concluding remarks --
- 8. Conclusion -- Bibliography -- Author's biography
- Dimensions
- unknown
- Extent
- 1 online resource (xiii, 77 p.)
- File format
- multiple file formats
- Form of item
- online
- Isbn
- 9781608457694
- Isbn Type
- (electronic bk.)
- Other control number
- 10.2200/S00431ED1V01Y201207DTM028
- Other physical details
- ill.
- Reformatting quality
- access
- Specific material designation
- remote
- Stock number
- CL0500000332
- System control number
-
- (OCoLC)799363515
- (OCoLC)ocn799363515
Subject
- Anomaly detection (Computer security)
- Anomaly detection (Computer security)
- Anomaly detection (Computer security)
- COMPUTERS / Internet / Security
- COMPUTERS / Networking / Security
- COMPUTERS / Security / General
- Computer security
- Computer security
- Computer security
- Computer security
- Data protection
- Data protection
- Data protection
- Data protection
- Electronic books
- Electronic books
- Internal security
- Internal security
- Internal security
- Internal security
- access control
- anomaly detection
- authentication
- data privacy
- data security
- separation of-duty
- Anomaly detection (Computer security)
Genre
Member of
Library Locations
-
African Studies LibraryBorrow it771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US42.350723 -71.108227
-
-
Astronomy LibraryBorrow it725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US42.350259 -71.105717
-
Fineman and Pappas Law LibrariesBorrow it765 Commonwealth Avenue, Boston, MA, 02215, US42.350979 -71.107023
-
Frederick S. Pardee Management LibraryBorrow it595 Commonwealth Avenue, Boston, MA, 02215, US42.349626 -71.099547
-
Howard Gotlieb Archival Research CenterBorrow it771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US42.350723 -71.108227
-
-
Music LibraryBorrow it771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350723 -71.108227
-
Pikering Educational Resources LibraryBorrow it2 Silber Way, Boston, MA, 02215, US42.349804 -71.101425
-
School of Theology LibraryBorrow it745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350494 -71.107235
-
Science & Engineering LibraryBorrow it38 Cummington Mall, Boston, MA, 02215, US42.348472 -71.102257
-
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/portal/Data-protection-from-insider-threats-Elisa/hJi9UpvfNm0/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/Data-protection-from-insider-threats-Elisa/hJi9UpvfNm0/">Data protection from insider threats, Elisa Bertino, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Data protection from insider threats, Elisa Bertino, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/portal/Data-protection-from-insider-threats-Elisa/hJi9UpvfNm0/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/Data-protection-from-insider-threats-Elisa/hJi9UpvfNm0/">Data protection from insider threats, Elisa Bertino, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>