pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: DATA PROTECTION FROM INSIDER THREATS
By: Elisa Bertino
Format: Paperback

List price: £41.95


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 1608457680
ISBN 13: 9781608457687
Publisher: MORGAN & CLAYPOOL PUBLISHERS
Pub. date: 13 July, 2012
Series: Synthesis Lectures on Data Management
Pages: 91
Synopsis: As data represent a key asset for today's organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations' minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques - such as firewalls and network security tools - are unable to protect data from attacks posed by those working on an organization's "inside." These "insiders" usually have authorized access to relevant information systems, making it extremely challenging to block the misuse of information while still allowing them to do their jobs. This book discusses several techniques that can provide effective protection against attacks posed by people working on the inside of an organization. Chapter One introduces the notion of insider threat and reports some data about data breaches due to insider threats. Chapter Two covers authentication and access control techniques, and Chapter Three shows how these general security techniques can be extended and used in the context of protection from insider threats.Chapter Four addresses anomaly detection techniques that are used to determine anomalies in data accesses by insiders. These anomalies are often indicative of potential insider data attacks and therefore play an important role in protection from these attacks. Security information and event management (SIEM) tools and fine-grained auditing are discussed in Chapter Five. These tools aim at collecting, analyzing, and correlating -- in real-time -- any information and event that may be relevant for the security of an organization. As such, they can be a key element in finding a solution to such undesirable insider threats. Chapter Six goes on to provide a survey of techniques for separation-of-duty (SoD). SoD is an important principle that, when implemented in systems and tools, can strengthen data protection from malicious insiders. However, to date, very few approaches have been proposed for implementing SoD in systems. In Chapter Seven, a short survey of a commercial product is presented, which provides different techniques for protection from malicious users with system privileges - such as a DBA in database management systems.Finally, in Chapter Eight, the book concludes with a few remarks and additional research directions.
Illustrations: black & white illustrations
Publication: US
Imprint: Morgan & Claypool Publishers
Returns: Returnable
Some other items by this author:
ACCESS CONTROL FOR DATABASES (PB)
ADVANCES IN DATABASE TECHNOLOGY-EDBT 2004 (PB)
ADVANCES IN SPATIAL AND TEMPORAL DATABASES (PB)
CLOUD COMPUTING AND SECURITY (PB)
CLOUD COMPUTING AND SECURITY (PB)
COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (PB)
COMPUTER SECURITY - ESORICS 96 (PB)
DATA PROTECTION FROM INSIDER THREATS
DATA PROTECTION FROM INSIDER THREATS
DIGITAL FORENSIC SCIENCE
DIGITAL FORENSIC SCIENCE (PB)
DISTRIBUTED AND PARALLEL DATABASE OBJECT MANAGEMENT (HB)
DISTRIBUTED AND PARALLEL DATABASE OBJECT MANAGEMENT (PB)
ECOOP 2000--OBJECT-ORIENTED PROGRAMMING
HOMOMORPHIC ENCRYPTION AND APPLICATIONS (PB)
IDENTITY MANAGEMENT (HB)
INDEXING TECHNIQUES FOR ADVANCED DATABASE SYSTEMS (HB)
INDEXING TECHNIQUES FOR ADVANCED DATABASE SYSTEMS (PB)
INTELLIGENT DATABASE SYSTEMS (PB)
JOURNAL ON DATA SEMANTICS II (PB)
MACHINE LEARNING TECHNIQUES FOR CYBERSECURITY
MACHINE LEARNING TECHNIQUES FOR CYBERSECURITY (HB)
NETWORK AND SYSTEM SECURITY (PB)
OBJECT ORIENTED DATABASE SYSTEMS: CONCEPTS AND ARCHITECTURE (PB)
OBJECT-ORIENTED METHODOLOGIES AND SYSTEMS (PB)
PRIVATE INFORMATION RETRIEVAL
PRIVATE INFORMATION RETRIEVAL
PRIVATE INFORMATION RETRIEVAL (PB)
PROGRESS IN WWW RESEARCH AND DEVELOPMENT (PB)
RFID SECURITY AND PRIVACY
RFID SECURITY AND PRIVACY
RFID SECURITY AND PRIVACY (PB)
ROLES, TRUST, AND REPUTATION IN SOCIAL MEDIA KNOWLEDGE MARKETS (HB)
ROLES, TRUST, AND REPUTATION IN SOCIAL MEDIA KNOWLEDGE MARKETS (PB)
SECURITY FOR WEB SERVICES AND SERVICE-ORIENTED ARCHITECTURES (HB)
SECURITY FOR WEB SERVICES AND SERVICE-ORIENTED ARCHITECTURES (PB)
TRANSPARENCY IN SOCIAL MEDIA (HB)
TRANSPARENCY IN SOCIAL MEDIA (PB)
TRUST MANAGEMENT III (HB)
TRUST MANAGEMENT III (PB)
XML SECURITY (PB)



Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 






Early Learning
Little Worried Caterpillar (PB) Little Green knows she''s about to make a big change - transformingfrom a caterpillar into a beautiful butterfly. Everyone is VERYexcited! But Little Green is VERY worried. What if being a butterflyisn''t as brilliant as everyone says?Join Little Green as she finds her own path ... with just a littlehelp from her friends.
add to basket

Early Learning
add to basket

Picture Book
All the Things We Carry PB What can you carry?A pebble? A teddy? A bright red balloon? A painting you''ve made?A hope or a dream?This gorgeous, reassuring picture book celebrates all the preciousthings we can carry, from toys and treasures to love and hope. With comforting rhymes and fabulous illustrations, this is a warmhug of a picture book.
add to basket