رکورد قبلیرکورد بعدی

" The insider threat : "


Document Type : BL
Record Number : 852032
Main Entry : Thompson, Eleanor E.
Title & Author : The insider threat : : assessment and mitigation of risks /\ Eleanor E. Thompson.
Publication Statement : Boca Raton :: Auerbach,, 2017.
Page. NO : 1 online resource (1 volume) :: illustrations (black and white)
ISBN : 1315351617
: : 1498747094
: : 9781315351612
: : 9781498747097
: 1498747086
: 9781498747080
Contents : Cover; Half Title; Title Page; Copyright Page; Dedication; Table of Contents; Acknowledgments; Author; CHAPTER 1: INTRODUCTION; 1.1 Introduction; 1.1.1 The Risk Landscape of Insider Threat; 1.1.2 The Ground Truth of Insider Threat; 1.1.3 An Insider Threat Employee Monologue; 1.1.4 The Risk Management Value Proposition; 1.1.5 Mental Models, Storytelling, and Ideological Change; Endnotes; CHAPTER 2: INSIDER CYBERSECURITY THREATS TO ORGANIZATIONS; 2.1 Introduction; 2.1.1 The Narrative Response; 2.1.2 The Categorical Response; 2.1.3 Assessing Risk; 2.1.4 Risk Scoring
: 2.1.5 Deeper Dive into Insider Cybersecurity Threats to Organization2.2 Organizational Access and Connections; 2.3 Human Behavior; 2.3.1 Staffing Cycle to Minimize Insider Threat; 2.4 Tangible Loss; 2.5 Policy Gaps; 2.6 Finance and Logistic Challenges; 2.7 Information Mismanagement; 2.8 Policing; 2.9 Time as a Threat Consideration; 2.10 Theoretical Discussion Turned into Practical Mental Models; 2.10.1 Mental Model (Aspect 1)-At the Crossroads; 2.10.2 Mental Model (Aspect 2)-The Virtuous and the Wicked; 2.10.3 In Review; Appendix: Best Practice-Practical Knowledge and Practitioner Application
: 4.7.1 Mental Model (Aspect 5) Cyber-Physical Digital-Analog BilingualismAppendix: Best Practice-Practical Knowledge and Practitioner Application; Endnotes; CHAPTER 5: MANAGERIAL AND INFORMATION TECHNOLOGY SPECIALIST APPROACHES TO MITIGATING RISK AND INCREASING ORGANIZATIONAL RESILIENCE; 5.1 Introduction; 5.1.1 The Narrative Response; 5.1.2 The Categorical Response; 5.2 Managerial Approaches; 5.2.1 Training Emphasis; 5.2.2 Practice in Application; 5.2.3 Develop and Follow Business Rules and Guidelines; 5.2.4 Storytelling: Tell Stories That Transcend and Interpret Cyber-Physical Reality
: Appendix: Best Practice-Practical Knowledge and Practitioner ApplicationEndnotes; CHAPTER 4: HOW INSIDER THREAT FACTORS RELATE TO VULNERABILITY AND CONSEQUENCE; 4.1 Introduction; 4.1.1 The Narrative Response; 4.1.2 The Categorical Response; 4.2 All Factors of Insider Threat and How They Relate to Vulnerability and Consequence; 4.3 Consequences Are Complex and Have Different Levels of Impact; 4.4 Problematic Linkages with Processes and Consequences; 4.5 Mitigation Considerations; 4.6 Organizational Resilience Factors; 4.7 Practical Mental Models Continued
: EndnotesCHAPTER 3: ORGANIZATIONAL RISK FACTORS FOR UNINTENDED INSIDER THREAT; 3.1 Introduction; 3.1.1 The Narrative Response; 3.1.2 The Categorical Response; 3.2 Human Behavioral Risk Factors as Typologies; 3.3 Organizational Process Risk Factors; 3.4 Physical Environmental Risk Factors; 3.5 Architectural IT System Wellness Risk Factors; 3.6 Aggravated Risk Mitigation Approach; 3.7 Unknown Factors; 3.8 Practical Mental Models Continued; 3.8.1 Mental Model (Aspect 3)-Risky Human Behavior as Typologies; 3.8.2 Mental Model (Aspect 4)-The Enforcer and the Responder; 3.8.3 In Review
Subject : Risk management.
Subject : BUSINESS ECONOMICS-- Industrial Management.
Subject : BUSINESS ECONOMICS-- Management Science.
Subject : BUSINESS ECONOMICS-- Management.
Subject : BUSINESS ECONOMICS-- Organizational Behavior.
Subject : Risk management.
Dewey Classification : ‭658.155‬
LC Classification : ‭HD61‬
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟