中图分类
执行
    报告类别
    执行
    中文(共0篇) 外文(共59篇)
    排序:
    导出 保存至文件
    [科技报告]   Collins, M.        共175页
    摘要 : No abstract available

    [科技报告]   Silowash, G. J.   Spooner, D. L.   Costa, D. L.   Albrethsen, M. J.        共37页
    摘要 : No abstract available
    关键词 : Insider Threat Programs  

    [科技报告]   Moore, A.   Hanley, M.   Mundie, D.        共28页
    摘要 : A research project at the CERT Program is identifying enterprise architectural patterns to protect against the insider threat to organizations. This report presents an example of such a pattern Increased Monitoring for Intellectua... 展开

    [科技报告]   Costa, D. L.   Albrethsen, M. J.   Collins, M. L.        共87页

    [科技报告]   Montelibano, J.   Moore, A.        共29页
    摘要 : The Insider Threat Security Reference Architecture (ITSRA) provides an enterprise-wide solution to insider threat. The architecture consists of four security layers: Business, Information, Data, and Application. Organizations shou... 展开

    [科技报告]   Kowalski, E.   Cappelli, D.   Moore, A.        共58页
    摘要 : The insider threat issue is a problem faced by all industries and sectors today. It is an issue of growing concern as the consequences of insider incidents can include not only financial losses, but the loss of clients and busines... 展开

    [科技报告]   Hallahan, J.        共80页
    摘要 : The primary objective of this project was to research and develop applied computer forensic approaches for preventing and detecting insider threats in sensitive organizations in conjunction with advanced access control systems suc... 展开

    [科技报告]   Lewellen, T.   Moore, A. P.   Cappelli, D. M.   Trzeciak, R. F.   Spooner, D.        共19页
    摘要 : This article is the sixth in the series Spotlight On, published by the CERT Insider Threat Center at Carnegie Mellon University s Software Engineering Institute and funded by CyLab. Each article focuses on a specific area of conce... 展开

    [科技报告]   Santos, J. E.        共8页
    摘要 : There exists a critical gap in current insider threat technology. To date, efforts on insider threat have not seriously taken into account the impact of deception by the insider. Needless to say, without a clear understanding of t... 展开

    研究趋势
    相关热图
    学科分类