Chiudi

Aggiungi l'articolo in

Chiudi
Aggiunto

L’articolo è stato aggiunto alla lista dei desideri

Chiudi

Crea nuova lista

Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within - Julie E Mehan - cover
Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within - Julie E Mehan - cover
Dati e Statistiche
Wishlist Salvato in 0 liste dei desideri
Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within
Disponibile in 2 settimane
66,00 €
66,00 €
Disp. in 2 settimane
Chiudi
Altri venditori
Prezzo e spese di spedizione
ibs
66,00 € Spedizione gratuita
disponibile in 2 settimane disponibile in 2 settimane
Info
Nuovo
Altri venditori
Prezzo e spese di spedizione
ibs
66,00 € Spedizione gratuita
disponibile in 2 settimane disponibile in 2 settimane
Info
Nuovo
Altri venditori
Prezzo e spese di spedizione
Chiudi

Tutti i formati ed edizioni

Chiudi
Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within - Julie E Mehan - cover
Chiudi

Promo attive (0)

Descrizione


Insider Threat - A Guide to Understanding, Detecting, and Defending Against the Enemy from Within looks beyond perimeter protection tools, and shows how a security culture based on international best practice can help mitigate the insider threat to your security. It also provides some short-term quick fixes that can be applied as your organizations builds an effective insider threat programme. Read this book to learn: *The seven organizational characteristics common to insider threat victims. *The ten stages of a malicious attack. *The ten steps of a successful insider threat programme. *How to construct a three-tier security culture, encompassing artefacts, values and shared assumptions. Insider Threat details the measures that organizations can implement to ensure high-impact quick wins, mapping appropriate security controls from the ISO 27001, ISO 27002, and NIST SP 800-53 standards to the following points, and more: *Risk mitigation and the eight steps of a risk assessment *The importance of training and awareness, and conducting staff background screening *Monitoring and auditing the activities of general and privileged users, and quickly responding to suspicious behaviors *Metrics to measure insider threat behavior and mitigation *The challenge of external or temporary insiders (such as consultants, support contractors, partners, service providers, temporary employees) *Layering physical and digital defenses to provide defense in depth *The importance of conducting regular penetration testing to evaluate security controls *Limiting, monitoring and controlling remote access and mobile device use *Ensuring supply-chain security *Maintaining an incident management capability It also sets out what not to do, listing a set of worst practices that should be avoided.
Leggi di più Leggi di meno

Dettagli

2016
Paperback / softback
312 p.
Testo in English
219 x 140 mm
404 gr.
9781849288392
Chiudi
Aggiunto

L'articolo è stato aggiunto al carrello

Chiudi

Aggiungi l'articolo in

Chiudi
Aggiunto

L’articolo è stato aggiunto alla lista dei desideri

Chiudi

Crea nuova lista

Chiudi

Chiudi

Siamo spiacenti si è verificato un errore imprevisto, la preghiamo di riprovare.

Chiudi

Verrai avvisato via email sulle novità di Nome Autore