31,95 €
31,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
16 °P sammeln
31,95 €
31,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
16 °P sammeln
Als Download kaufen
31,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
16 °P sammeln
Jetzt verschenken
31,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
16 °P sammeln
  • Format: ePub

Every type of organisation is vulnerable to insider abuse, errors, and malicious attacks: grant anyone access to a system and you automatically introduce a vulnerability. Insiders can be current or former employees, contractors, or other business partners who have been granted authorised access to networks, systems, or data, and all of them can bypass security measures through legitimate means.Insider Threat - A Guide to Understanding, Detecting, and Defending Against the Enemy from Withinshows how a security culture based on international best practice can help mitigate the insider threat,…mehr

  • Geräte: eReader
  • mit Kopierschutz
  • eBook Hilfe
  • Größe: 3.51MB
Produktbeschreibung
Every type of organisation is vulnerable to insider abuse, errors, and malicious attacks: grant anyone access to a system and you automatically introduce a vulnerability. Insiders can be current or former employees, contractors, or other business partners who have been granted authorised access to networks, systems, or data, and all of them can bypass security measures through legitimate means.Insider Threat - A Guide to Understanding, Detecting, and Defending Against the Enemy from Withinshows how a security culture based on international best practice can help mitigate the insider threat, providing short-term quick fixes and long-term solutions that can be applied as part of an effective insider threat program.Read this book to learn the seven organisational characteristics common to insider threat victims; the ten stages of a malicious attack; the ten steps of a successful insider threat program; and the construction of a three-tier security culture, encompassing artefacts, values, and shared assumptions. Perhaps most importantly, it also sets out whatnotto do, listing a set of worst practices that should be avoided.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Dr Julie Mehan is a Principal Analyst for a strategic consulting firm in the State of Virginia. She has been a career Government Service employee, a strategic consultant, and an entrepreneur.