中图分类
执行
    报告类别
    执行
    中文(共0篇) 外文(共105篇)
    排序:
    导出 保存至文件
    [科技报告]   Montelibano, J.   Moore, A.        共29页
    摘要 : The Insider Threat Security Reference Architecture (ITSRA) provides an enterprise-wide solution to insider threat. The architecture consists of four security layers: Business, Information, Data, and Application. Organizations shou... 展开

    [科技报告]   Costa, D. L.   Albrethsen, M. J.   Collins, M. L.        共87页

    [科技报告]   Moore, A.   Hanley, M.   Mundie, D.        共28页
    摘要 : A research project at the CERT Program is identifying enterprise architectural patterns to protect against the insider threat to organizations. This report presents an example of such a pattern Increased Monitoring for Intellectua... 展开

    [科技报告]   McCormac, A.   Parsons, K.   Butavicius, M.        共32页
    摘要 : This report examines previous research on malicious insiders with particular emphasis on the social and psychological factors that may have influenced the attacker and their behaviours. This research also draws on corresponding st... 展开

    [科技报告]   Lewellen, T.   Moore, A. P.   Cappelli, D. M.   Trzeciak, R. F.   Spooner, D.        共19页
    摘要 : This article is the sixth in the series Spotlight On, published by the CERT Insider Threat Center at Carnegie Mellon University s Software Engineering Institute and funded by CyLab. Each article focuses on a specific area of conce... 展开

    [科技报告]   Santos, J. E.        共8页
    摘要 : There exists a critical gap in current insider threat technology. To date, efforts on insider threat have not seriously taken into account the impact of deception by the insider. Needless to say, without a clear understanding of t... 展开

    [科技报告]   Collins, M. L.        共18页
    摘要 : No abstract available.

    摘要 : We describe our ongoing development of an insider threat indicator ontology. Our ontology is intended to serve as a standardized expression method for potential indicators of malicious insider activity, as well as a formalization ... 展开

    研究趋势
    相关热图
    学科分类