Document Type
|
:
|
BL
|
Record Number
|
:
|
852032
|
Main Entry
|
:
|
Thompson, Eleanor E.
|
Title & Author
|
:
|
The insider threat : : assessment and mitigation of risks /\ Eleanor E. Thompson.
|
Publication Statement
|
:
|
Boca Raton :: Auerbach,, 2017.
|
Page. NO
|
:
|
1 online resource (1 volume) :: illustrations (black and white)
|
ISBN
|
:
|
1315351617
|
|
:
|
: 1498747094
|
|
:
|
: 9781315351612
|
|
:
|
: 9781498747097
|
|
:
|
1498747086
|
|
:
|
9781498747080
|
Contents
|
:
|
Cover; Half Title; Title Page; Copyright Page; Dedication; Table of Contents; Acknowledgments; Author; CHAPTER 1: INTRODUCTION; 1.1 Introduction; 1.1.1 The Risk Landscape of Insider Threat; 1.1.2 The Ground Truth of Insider Threat; 1.1.3 An Insider Threat Employee Monologue; 1.1.4 The Risk Management Value Proposition; 1.1.5 Mental Models, Storytelling, and Ideological Change; Endnotes; CHAPTER 2: INSIDER CYBERSECURITY THREATS TO ORGANIZATIONS; 2.1 Introduction; 2.1.1 The Narrative Response; 2.1.2 The Categorical Response; 2.1.3 Assessing Risk; 2.1.4 Risk Scoring
|
|
:
|
2.1.5 Deeper Dive into Insider Cybersecurity Threats to Organization2.2 Organizational Access and Connections; 2.3 Human Behavior; 2.3.1 Staffing Cycle to Minimize Insider Threat; 2.4 Tangible Loss; 2.5 Policy Gaps; 2.6 Finance and Logistic Challenges; 2.7 Information Mismanagement; 2.8 Policing; 2.9 Time as a Threat Consideration; 2.10 Theoretical Discussion Turned into Practical Mental Models; 2.10.1 Mental Model (Aspect 1)-At the Crossroads; 2.10.2 Mental Model (Aspect 2)-The Virtuous and the Wicked; 2.10.3 In Review; Appendix: Best Practice-Practical Knowledge and Practitioner Application
|
|
:
|
4.7.1 Mental Model (Aspect 5) Cyber-Physical Digital-Analog BilingualismAppendix: Best Practice-Practical Knowledge and Practitioner Application; Endnotes; CHAPTER 5: MANAGERIAL AND INFORMATION TECHNOLOGY SPECIALIST APPROACHES TO MITIGATING RISK AND INCREASING ORGANIZATIONAL RESILIENCE; 5.1 Introduction; 5.1.1 The Narrative Response; 5.1.2 The Categorical Response; 5.2 Managerial Approaches; 5.2.1 Training Emphasis; 5.2.2 Practice in Application; 5.2.3 Develop and Follow Business Rules and Guidelines; 5.2.4 Storytelling: Tell Stories That Transcend and Interpret Cyber-Physical Reality
|
|
:
|
Appendix: Best Practice-Practical Knowledge and Practitioner ApplicationEndnotes; CHAPTER 4: HOW INSIDER THREAT FACTORS RELATE TO VULNERABILITY AND CONSEQUENCE; 4.1 Introduction; 4.1.1 The Narrative Response; 4.1.2 The Categorical Response; 4.2 All Factors of Insider Threat and How They Relate to Vulnerability and Consequence; 4.3 Consequences Are Complex and Have Different Levels of Impact; 4.4 Problematic Linkages with Processes and Consequences; 4.5 Mitigation Considerations; 4.6 Organizational Resilience Factors; 4.7 Practical Mental Models Continued
|
|
:
|
EndnotesCHAPTER 3: ORGANIZATIONAL RISK FACTORS FOR UNINTENDED INSIDER THREAT; 3.1 Introduction; 3.1.1 The Narrative Response; 3.1.2 The Categorical Response; 3.2 Human Behavioral Risk Factors as Typologies; 3.3 Organizational Process Risk Factors; 3.4 Physical Environmental Risk Factors; 3.5 Architectural IT System Wellness Risk Factors; 3.6 Aggravated Risk Mitigation Approach; 3.7 Unknown Factors; 3.8 Practical Mental Models Continued; 3.8.1 Mental Model (Aspect 3)-Risky Human Behavior as Typologies; 3.8.2 Mental Model (Aspect 4)-The Enforcer and the Responder; 3.8.3 In Review
|
Subject
|
:
|
Risk management.
|
Subject
|
:
|
BUSINESS ECONOMICS-- Industrial Management.
|
Subject
|
:
|
BUSINESS ECONOMICS-- Management Science.
|
Subject
|
:
|
BUSINESS ECONOMICS-- Management.
|
Subject
|
:
|
BUSINESS ECONOMICS-- Organizational Behavior.
|
Subject
|
:
|
Risk management.
|
Dewey Classification
|
:
|
658.155
|
LC Classification
|
:
|
HD61
|