Pierre-Emmanuel Arduin
Insider Threats (eBook, ePUB)
139,99 €
139,99 €
inkl. MwSt.
Sofort per Download lieferbar
0 °P sammeln
139,99 €
Als Download kaufen
139,99 €
inkl. MwSt.
Sofort per Download lieferbar
0 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
139,99 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
0 °P sammeln
Pierre-Emmanuel Arduin
Insider Threats (eBook, ePUB)
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
An information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of information systems. The security of information systems is usually tackled in a technological perspective. This book proposes to focus not only on information systems' security in a technological perspective, but also in a human, managerial and organizational perspective.
- Geräte: eReader
- mit Kopierschutz
- eBook Hilfe
- Größe: 4.29MB
Andere Kunden interessierten sich auch für
- Cappelli Dawn M.The CERT Guide to Insider Threats (eBook, ePUB)23,95 €
- Daniel AlbanInformation Systems Management (eBook, ePUB)139,99 €
- Olivier Le DeuffDigital Humanities (eBook, ePUB)139,99 €
- Maryse CarmesDigital Organizations Manufacturing (eBook, ePUB)139,99 €
- Tarek SamaraERP and Information Systems (eBook, ePUB)139,99 €
- Samuel SzonieckyEcosystems Knowledge (eBook, ePUB)139,99 €
- Nicolas TurenneKnowledge Needs and Information Extraction (eBook, ePUB)139,99 €
-
-
-
An information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of information systems. The security of information systems is usually tackled in a technological perspective. This book proposes to focus not only on information systems' security in a technological perspective, but also in a human, managerial and organizational perspective.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Wiley-IEEE Press
- Seitenzahl: 176
- Erscheinungstermin: 15. März 2018
- Englisch
- ISBN-13: 9781119516491
- Artikelnr.: 53058263
- Verlag: Wiley-IEEE Press
- Seitenzahl: 176
- Erscheinungstermin: 15. März 2018
- Englisch
- ISBN-13: 9781119516491
- Artikelnr.: 53058263
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Dr. Pierre-Emmanuel Arduin, Associate Professor, Université Paris-Dauphine, France. Cédric Campo-Paysaa, Security Consultant.
List of Figures ix
List of Scenarios xiii
Preface xv
Introduction xix
Part 1. Information Systems: Technologies and People 1
Chapter 1. Components with Known Purposes: Technologies 3
1.1. Up to the end of the 19th Century: decreasing transmission time 4
1.2. From the end of the 19th Century: decreasing processing time 14
1.3. From the end of the 20th Century: facing massification 21
Chapter 2. Components with Interpretive Aspects: People 25
2.1. Tacit knowing or, how do we know? 26
2.1.1. The existence of tacit knowledge 26
2.1.2. Sense-giving and sense-reading: knowledge is tacit 27
2.2. The interpretative framework, the filter through which we create our
knowledge 31
2.2.1. A tool for tacit knowing 31
2.2.2. The different types of interpretative frameworks 34
2.2.3. The commensurability of interpretative frameworks 37
2.3. The concept of incommensurability 38
2.3.1. From partial communication to incommensurability 39
2.3.2. Language - linking words to nature 41
2.3.3. Revolution - changing the meaning of words 44
2.4. Mental models, representations of reality 46
2.4.1. Incomplete representations 47
2.4.2. Cognitive representations 49
2.4.3. Shared mental models 50
2.4.4. Explaining mental models 51
Part 2. The Insider Threat 59
Chapter 3. The Three Categories of Insider Threats 61
Chapter 4. Unintentional 69
4.1. The quality of the stolen information 73
4.2. The case of apparently insignificant information that has hidden value
74
4.3. The case of information that can simply be asked for 78
4.4. The case of the information that will help you 81
Chapter 5. Intentional and Non-Malicious 83
5.1. Conflict between productivity and security 85
5.2. Workarounds, a factor for innovation or risk 88
5.2.1. Workarounds are an innovation 89
5.2.2. Workarounds are a risk 89
5.3. On non-malicious violations 90
5.3.1. Intentional behavior 91
5.3.2. Personal benefit without malicious intent 91
5.3.3. Voluntary breaking of the rules 92
5.3.4. Possible damage or risk to security 92
Chapter 6. Intentional and Malicious 95
6.1. The information is known; why not exploit it? 96
6.2. Organizational environment and cognitive processes of committing the
act 99
6.2.1. For the organization, deterrence prevents maliciousness 100
6.2.2. For the employee, moral disengagement justifies maliciousness 103
6.3. Ease of deterrence 105
Conclusion 111
Bibliography 117
Index 127
List of Scenarios xiii
Preface xv
Introduction xix
Part 1. Information Systems: Technologies and People 1
Chapter 1. Components with Known Purposes: Technologies 3
1.1. Up to the end of the 19th Century: decreasing transmission time 4
1.2. From the end of the 19th Century: decreasing processing time 14
1.3. From the end of the 20th Century: facing massification 21
Chapter 2. Components with Interpretive Aspects: People 25
2.1. Tacit knowing or, how do we know? 26
2.1.1. The existence of tacit knowledge 26
2.1.2. Sense-giving and sense-reading: knowledge is tacit 27
2.2. The interpretative framework, the filter through which we create our
knowledge 31
2.2.1. A tool for tacit knowing 31
2.2.2. The different types of interpretative frameworks 34
2.2.3. The commensurability of interpretative frameworks 37
2.3. The concept of incommensurability 38
2.3.1. From partial communication to incommensurability 39
2.3.2. Language - linking words to nature 41
2.3.3. Revolution - changing the meaning of words 44
2.4. Mental models, representations of reality 46
2.4.1. Incomplete representations 47
2.4.2. Cognitive representations 49
2.4.3. Shared mental models 50
2.4.4. Explaining mental models 51
Part 2. The Insider Threat 59
Chapter 3. The Three Categories of Insider Threats 61
Chapter 4. Unintentional 69
4.1. The quality of the stolen information 73
4.2. The case of apparently insignificant information that has hidden value
74
4.3. The case of information that can simply be asked for 78
4.4. The case of the information that will help you 81
Chapter 5. Intentional and Non-Malicious 83
5.1. Conflict between productivity and security 85
5.2. Workarounds, a factor for innovation or risk 88
5.2.1. Workarounds are an innovation 89
5.2.2. Workarounds are a risk 89
5.3. On non-malicious violations 90
5.3.1. Intentional behavior 91
5.3.2. Personal benefit without malicious intent 91
5.3.3. Voluntary breaking of the rules 92
5.3.4. Possible damage or risk to security 92
Chapter 6. Intentional and Malicious 95
6.1. The information is known; why not exploit it? 96
6.2. Organizational environment and cognitive processes of committing the
act 99
6.2.1. For the organization, deterrence prevents maliciousness 100
6.2.2. For the employee, moral disengagement justifies maliciousness 103
6.3. Ease of deterrence 105
Conclusion 111
Bibliography 117
Index 127
List of Figures ix
List of Scenarios xiii
Preface xv
Introduction xix
Part 1. Information Systems: Technologies and People 1
Chapter 1. Components with Known Purposes: Technologies 3
1.1. Up to the end of the 19th Century: decreasing transmission time 4
1.2. From the end of the 19th Century: decreasing processing time 14
1.3. From the end of the 20th Century: facing massification 21
Chapter 2. Components with Interpretive Aspects: People 25
2.1. Tacit knowing or, how do we know? 26
2.1.1. The existence of tacit knowledge 26
2.1.2. Sense-giving and sense-reading: knowledge is tacit 27
2.2. The interpretative framework, the filter through which we create our
knowledge 31
2.2.1. A tool for tacit knowing 31
2.2.2. The different types of interpretative frameworks 34
2.2.3. The commensurability of interpretative frameworks 37
2.3. The concept of incommensurability 38
2.3.1. From partial communication to incommensurability 39
2.3.2. Language - linking words to nature 41
2.3.3. Revolution - changing the meaning of words 44
2.4. Mental models, representations of reality 46
2.4.1. Incomplete representations 47
2.4.2. Cognitive representations 49
2.4.3. Shared mental models 50
2.4.4. Explaining mental models 51
Part 2. The Insider Threat 59
Chapter 3. The Three Categories of Insider Threats 61
Chapter 4. Unintentional 69
4.1. The quality of the stolen information 73
4.2. The case of apparently insignificant information that has hidden value
74
4.3. The case of information that can simply be asked for 78
4.4. The case of the information that will help you 81
Chapter 5. Intentional and Non-Malicious 83
5.1. Conflict between productivity and security 85
5.2. Workarounds, a factor for innovation or risk 88
5.2.1. Workarounds are an innovation 89
5.2.2. Workarounds are a risk 89
5.3. On non-malicious violations 90
5.3.1. Intentional behavior 91
5.3.2. Personal benefit without malicious intent 91
5.3.3. Voluntary breaking of the rules 92
5.3.4. Possible damage or risk to security 92
Chapter 6. Intentional and Malicious 95
6.1. The information is known; why not exploit it? 96
6.2. Organizational environment and cognitive processes of committing the
act 99
6.2.1. For the organization, deterrence prevents maliciousness 100
6.2.2. For the employee, moral disengagement justifies maliciousness 103
6.3. Ease of deterrence 105
Conclusion 111
Bibliography 117
Index 127
List of Scenarios xiii
Preface xv
Introduction xix
Part 1. Information Systems: Technologies and People 1
Chapter 1. Components with Known Purposes: Technologies 3
1.1. Up to the end of the 19th Century: decreasing transmission time 4
1.2. From the end of the 19th Century: decreasing processing time 14
1.3. From the end of the 20th Century: facing massification 21
Chapter 2. Components with Interpretive Aspects: People 25
2.1. Tacit knowing or, how do we know? 26
2.1.1. The existence of tacit knowledge 26
2.1.2. Sense-giving and sense-reading: knowledge is tacit 27
2.2. The interpretative framework, the filter through which we create our
knowledge 31
2.2.1. A tool for tacit knowing 31
2.2.2. The different types of interpretative frameworks 34
2.2.3. The commensurability of interpretative frameworks 37
2.3. The concept of incommensurability 38
2.3.1. From partial communication to incommensurability 39
2.3.2. Language - linking words to nature 41
2.3.3. Revolution - changing the meaning of words 44
2.4. Mental models, representations of reality 46
2.4.1. Incomplete representations 47
2.4.2. Cognitive representations 49
2.4.3. Shared mental models 50
2.4.4. Explaining mental models 51
Part 2. The Insider Threat 59
Chapter 3. The Three Categories of Insider Threats 61
Chapter 4. Unintentional 69
4.1. The quality of the stolen information 73
4.2. The case of apparently insignificant information that has hidden value
74
4.3. The case of information that can simply be asked for 78
4.4. The case of the information that will help you 81
Chapter 5. Intentional and Non-Malicious 83
5.1. Conflict between productivity and security 85
5.2. Workarounds, a factor for innovation or risk 88
5.2.1. Workarounds are an innovation 89
5.2.2. Workarounds are a risk 89
5.3. On non-malicious violations 90
5.3.1. Intentional behavior 91
5.3.2. Personal benefit without malicious intent 91
5.3.3. Voluntary breaking of the rules 92
5.3.4. Possible damage or risk to security 92
Chapter 6. Intentional and Malicious 95
6.1. The information is known; why not exploit it? 96
6.2. Organizational environment and cognitive processes of committing the
act 99
6.2.1. For the organization, deterrence prevents maliciousness 100
6.2.2. For the employee, moral disengagement justifies maliciousness 103
6.3. Ease of deterrence 105
Conclusion 111
Bibliography 117
Index 127