Insider Attack and Cyber Security

Beyond the Hacker

ISBN: 978-0-387-77321-6 (Print) 978-0-387-77322-3 (Online)

Table of contents (13 chapters)

  1. Front Matter

    Pages I-XI

  2. No Access

    Book Chapter

    Pages 1-4

    The Insider Attack Problem Nature and Scope

  3. No Access

    Book Chapter

    Pages 5-16

    Reflections on the Insider Threat

  4. No Access

    Book Chapter

    Pages 17-52

    The “Big Picture” of Insider IT Sabotage Across U.S. Critical Infrastructures

  5. No Access

    Book Chapter

    Pages 53-68

    Data Theft: A Prototypical Insider Threat

  6. No Access

    Book Chapter

    Pages 69-90

    A Survey of Insider Attack Detection Research

  7. No Access

    Book Chapter

    Pages 91-112

    Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure

  8. No Access

    Book Chapter

    Pages 113-132

    Towards a Virtualization-enabled Framework for Information Traceability (VFIT)

  9. No Access

    Book Chapter

    Pages 133-152

    Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach

  10. No Access

    Book Chapter

    Pages 153-164

    Surviving Insider Attacks: A Call for System Experiments

  11. No Access

    Book Chapter

    Pages 165-194

    Preventative Directions For Insider Threat Mitigation Via Access Control

  12. No Access

    Book Chapter

    Pages 195-214

    Taking Stock and Looking Forward – An Outsider’s Perspective on the Insider Threat

  13. No Access

    Book Chapter

    Pages 215-218

    Hard Problems and Research Challenges

  14. No Access

    Book Chapter

    Pages 219-222

    Hard Problems and Research Challenges Concluding Remarks

  15. Back Matter

    Pages 223-223