- Shopping Bag ( 0 items )
This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as ...
This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most likely to pose a threat. Next, the reader will learn about the variety of tools and attacks used by insiders to commit their crimes including: encryption, steganography, and social engineering. The book will then specifically address the dangers faced by corporations and government agencies. Finally, the reader will learn how to design effective security systems to prevent insider attacks and how to investigate insider security breeches that do occur.
Throughout the book, the authors will use their backgrounds in the CIA to analyze several, high-profile cases involving insider threats.
* Tackles one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today
* Both co-authors worked for several years at the CIA, and they use this experience to analyze several high-profile cases involving insider threat attacks
* Despite the frequency and harm caused by insider attacks, there are no competing books on this topic.books on this topic
Within this text is information to teach IT professionals and law enforcement officials about the dangers posed by insiders to a company's IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies.
Posted October 21, 2006
Do you know how to prevent employees and contractors from stealing your corporate data? If you don¿t, then this book is for you. Authors Eric Cole and Sandra Ring, have done an outstanding job of writing a book that shows you how to protect your enterprise from sabotage, spying and theft. Cole and Ring, begin with an introduction on how bad the insider threat problem really is and why you should be concerned about it. Then, the authors cover a wide range of technologies and methods that can be used by an insider to cause harm to a company. Next, they discuss unique insider threats to state and local government institutions. The authors continue by drawing your attention to the fact that insiders within the federal government do not just commit espionage. They also discuss various threats to information, such as sabotage and theft, the impact of these actions to the reputation and financial health of organizations, and describe several real-life case studies involving well-known commercial companies. Next, the authors highlight the threat of identity theft and what institutions can do to help prevent insiders from participating in fraud rings. The authors also focus on insider threats from government contractors. Then, they do a profile of insider threats. The authors continue by showing you how to respond to problem of insider threat by looking at technologies and concepts that can be used to control and limit the damage that insiders can perform. Finally, they examine how a company goes about surviving an insider threat and increasing their defenses over time to minimize the amount of damage it will cause. This most excellent book will show you why internal threats are exponentially more dangerous that external threats. More importantly, this book will show you how to protect your most important intellectual property assets.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.