Advertisement

Insider Threats in Cyber Security

  • Christian W. Probst
  • Jeffrey Hunker
  • Dieter Gollmann
  • Matt Bishop

Part of the Advances in Information Security book series (ADIS, volume 49)

Table of contents

  1. Front Matter
    Pages 1-10
  2. Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop
    Pages 1-15
  3. Peter G. Neumann
    Pages 17-44
  4. Lizzie Coles-Kemp, Marianthi Theoharidou
    Pages 45-71
  5. Ulrich Flegel, Julien Vayssière, Gunter Bitz
    Pages 73-84
  6. Matt Bishop, Sophie Engle, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert et al.
    Pages 115-137
  7. Ulrich Flegel, Florian Kerschbaum, Philip Miseldine, Ganna Monakova, Richard Wacker, Frank Leymann
    Pages 139-171
  8. Jason Crampton, Michael Huth
    Pages 173-195
  9. Brian M. Bowen, Malek Ben Salem, Angelos D. Keromytis, Salvatore J. Stolfo
    Pages 197-217
  10. George Magklaras, Steven Furnell
    Pages 219-244

About this book

Introduction

Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior Policy Advisor at MCI, Ontario, Canada comments "The book will be a must read, so of course I’ll need a copy."

Insider Threats in Cyber Security covers all aspects of insider threats, from motivation to mitigation. It includes how to monitor insider threats (and what to monitor for), how to mitigate insider threats, and related topics and case studies.

Insider Threats in Cyber Security is intended for a professional audience composed of the military, government policy makers and banking; financing companies focusing on the Secure Cyberspace industry. This book is also suitable for advanced-level students and researchers in computer science as a secondary text or reference book.

Keywords

Audit Information Technology (IT) Motivation computer science cryptology cybersecurity data security encryption information security modeling monitoring privacy security service-oriented computing structure

Editors and affiliations

  • Christian W. Probst
    • 1
  • Jeffrey Hunker
    • 2
  • Dieter Gollmann
    • 3
  • Matt Bishop
    • 4
  1. 1., Informatics & Mathematical ModellingTechnical University of DenmarkKongens LyngbyDenmark
  2. 2.PittsburghUSA
  3. 3.Hamburg-Harburg, Institut für Sicherheit in verteiltenTechnische UniversitaetHamburg-HarburgGermany
  4. 4., Department of Computer ScienceUniversity of California, DavisDavisUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-1-4419-7133-3
  • Copyright Information Springer Science+Business Media, LLC 2010
  • Publisher Name Springer, Boston, MA
  • eBook Packages Computer Science
  • Print ISBN 978-1-4419-7132-6
  • Online ISBN 978-1-4419-7133-3
  • Series Print ISSN 1568-2633
  • Buy this book on publisher's site