INSIDER THREAT: A Guide to Understanding, Detecting, and Defending Against t...

GoldenGoodsStore
(2394)
Angemeldet als gewerblicher Verkäufer
US $49,95
Ca.EUR 42,85
oder Preisvorschlag
Artikelzustand:
Neuwertig
Das interessiert die Leute. 2 haben das auf ihrer Beobachtungsliste.
Versand:
Kostenlos USPS Media MailTM.
Standort: Santa Fe, New Mexico, USA
Lieferung:
Lieferung zwischen Sa, 11. Okt und Do, 16. Okt nach 94104 bei heutigem Zahlungseingang
Wir wenden ein spezielles Verfahren zur Einschätzung des Liefertermins an – in diese Schätzung fließen Faktoren wie die Entfernung des Käufers zum Artikelstandort, der gewählte Versandservice, die bisher versandten Artikel des Verkäufers und weitere ein. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
Rücknahme:
Keine Rücknahme.
Zahlungen:
   Diners Club 

Sicher einkaufen

eBay-Käuferschutz
Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. Mehr erfahreneBay-Käuferschutz - wird in neuem Fenster oder Tab geöffnet

  • Gratis Rückversand im Inland
  • Punkte für jeden Kauf und Verkauf
  • Exklusive Plus-Deals
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:335882045070
Zuletzt aktualisiert am 08. Okt. 2025 18:15:31 MESZAlle Änderungen ansehenAlle Änderungen ansehen

Artikelmerkmale

Artikelzustand
Neuwertig: Buch, das wie neu aussieht, aber bereits gelesen wurde. Der Einband weist keine ...
Book Title
Insider Threat : A Guide to Understanding, Detecting, and Defendi
ISBN
9781849288392
Kategorie

Über dieses Produkt

Product Identifiers

Publisher
IT Governance LTD
ISBN-10
1849288399
ISBN-13
9781849288392
eBay Product ID (ePID)
240007352

Product Key Features

Number of Pages
312 Pages
Publication Name
Insider Threat : a Guide to Understanding, Detecting, and Defending Against the Enemy from Within
Language
English
Subject
Business Ethics, Electronic Commerce (See Also Headings under Business & Economics / E-Commerce), Security / Networking
Publication Year
2016
Type
Textbook
Author
I. T. Governance
Subject Area
Computers, Business & Economics
Format
Trade Paperback

Dimensions

Item Height
0.7 in
Item Weight
14.3 Oz
Item Length
8.6 in
Item Width
5.5 in

Additional Product Features

Intended Audience
Scholarly & Professional
Reviews
"This manuscript is no less than what I would expect from a PHd with your track record... I am especially taken by the depth of your analysis and the combination of baselines and explanations." ir. H.L. (Maarten) Souw RE, Enterprise Risk and QA Manager, UVW
Illustrated
Yes
Synopsis
Insider Threat - A Guide to Understanding, Detecting, and Defending Against the Enemy from Within looks beyond perimeter protection tools, and shows how a security culture based on international best practice can help mitigate the insider threat to your security. It also provides some short-term quick fixes that can be applied as your organizations builds an effective insider threat program.Read this book to learn:·The seven organizational characteristics common to insider threat victims.·The ten stages of a malicious attack.·The ten steps of a successful insider threat programme.·How to construct a three-tier security culture, encompassing artefacts, values and shared assumptions.Insider Threat details the measures that organizations can implement to ensure high-impact quick wins, mapping appropriate security controls from the ISO 27001, ISO 27002, and NIST SP 800-53 standards to the following points, and more:·Risk mitigation and the eight steps of a risk assessment·The importance of training and awareness, and conducting staff background screening·Monitoring and auditing the activities of general and privileged users, and quickly responding to suspicious behaviors·Metrics to measure insider threat behavior and mitigation·The challenge of external or temporary insiders (such as consultants, support contractors, partners, service providers, temporary employees)·Layering physical and digital defenses to provide defense in depth·The importance of conducting regular penetration testing to evaluate security controls·Limiting, monitoring and controlling remote access and mobile device use·Ensuring supply-chain security·Maintaining an incident management capabilityIt also sets out what not to do, listing a set of worst practices that should be avoided., Insider Threat examines the traits common to individuals that change from insiders to insider threats, and explains how smart organisations can avoid them., Every type of organisation is vulnerable to insider abuse, errors or malicious attacks. These can impact reputation, operations and profitability, and expose data, harm the organisation, or deliver valuable intellectual property into competitors' hands. Insiders can be current or former employees, contractors, or other business partners who have been granted authorised access to networks, systems or data, and all of them can bypass security measures through legitimate means. Product overview Insider Threat - A Guide to Understanding, Detecting, and Defending Against the Enemy from Within looks beyond perimeter protection tools, and shows how a security culture based on international best practice can help mitigate the insider threat to your security. It also provides some short-term quick fixes that can be applied as your organisations builds an effective insider threat programme. Read this book to learn: The seven organisational characteristics common to insider threat victims. The ten stages of a malicious attack. The ten steps of a successful insider threat programme. How to construct a three-tier security culture, encompassing artefacts, values and shared assumptions. Insider Threat details the measures that organisations can implement to ensure high-impact quick wins, mapping appropriate security controls from the ISO 27001, ISO 27002, and NIST SP 800-53 standards to the following points, and more: Risk mitigation and the eight steps of a risk assessment The importance of training and awareness, and conducting staff background screening Monitoring and auditing the activities of general and privileged users, and quickly responding to suspicious behaviours Metrics to measure insider threat behaviour and mitigation The challenge of external or temporary insiders (such as consultants, support contractors, partners, service providers, temporary employees) Layering physical and digital defences to provide defence in depth The importance of conducting regular penetration testing to evaluate security controls Limiting, monitoring and controlling remote access and mobile device use Ensuring supply-chain security Maintaining an incident management capability It also sets out what not to do, listing a set of worst practices that should be avoided. The insider threat comes in many forms. Insider Threat is the most in-depth guide to help you prepare for them. Order your copy today. About the author Dr Julie Mehan is the founder and president of JEMStone Strategies and a principal in a strategic consulting firm in Virginia. She has delivered cyber security and related privacy services to senior commercial, Department of Defense and federal government clients working in Italy, Australia, Canada, Belgium and the United States. Dr Mehan is also an associate professor at the University of Maryland University College, specialising in courses in cybersecurity, cyberterror, IT in organisations, and ethics in an Internet society., Insider Threat - A Guide to Understanding, Detecting, and Defending Against the Enemy from Within looks beyond perimeter protection tools, and shows how a security culture based on international best practice can help mitigate the insider threat to your security.

Artikelbeschreibung des Verkäufers

Rechtliche Informationen des Verkäufers

Ich versichere, dass alle meine Verkaufsaktivitäten in Übereinstimmung mit allen geltenden Gesetzen und Vorschriften der EU erfolgen.
Info zu diesem Verkäufer

GoldenGoodsStore

100% positive Bewertungen5.087 Artikel verkauft

Mitglied seit Dez 2005
Angemeldet als gewerblicher Verkäufer
Shop besuchenKontakt

Detaillierte Verkäuferbewertungen

Durchschnitt in den letzten 12 Monaten
Genaue Beschreibung
4.9
Angemessene Versandkosten
5.0
Lieferzeit
5.0
Kommunikation
4.9

Verkäuferbewertungen (1.659)

Alle Bewertungen
Positiv
Neutral
Negativ
  • t***b (9)- Bewertung vom Käufer.
    Letzte 6 Monate
    Bestätigter Kauf
    Absolutely love it! Package arrived safely and was securely packaged, protecting it from any damages - very thankful for that! It came as described - brand new and I’m very happy I’m able to write my name on the empty pages. It holds sentimental value. I love the Bible’s from the Precious Moments Company and getting this fulfills my childhood memories. Highly recommend this seller. Would definitely buy from this seller again!
  • a***t (46)- Bewertung vom Käufer.
    Letzter Monat
    Bestätigter Kauf
    Item was thoughtfully packed and shipped quickly. It arrived as described and at a great value. Seller provided prompt and very courteous customer service as well! Very happy with experience!
  • r***_ (14)- Bewertung vom Käufer.
    Letzte 6 Monate
    Bestätigter Kauf
    Just as described! Excellent condition book with no signs of usage. Great value for the money, though I think it is definitely worth more! Book was packaged well and shipped by the seller in a very short amount of time. I will really enjoy reading this book, as General John Brown Gordon is one of my favorite generals! ❤️ He had a very fascinating life before, during, and after the war. Thank you so much! Would definitely order from this seller again!