FREE SHIPPING

on all orders of $79 or more

$3 OFF your purchase of $60 or more!
Use coupon code SATURDAY in checkout.

The CERT Guide to Insider Threats How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)

, by ; ;
The CERT Guide to Insider Threats How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) by Cappelli, Dawn M.; Moore, Andrew P.; Trzeciak, Randall F., 9780321812575
Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
  • ISBN: 9780321812575 | 0321812573
  • Cover: Hardcover
  • Copyright: 1/24/2012
  • Buy New Book

    Currently Available, Usually Ships in 24-48 Hours

    $49.97
  • eBook

    Available Instantly

    Online: 365 Days

    Downloadable: Lifetime Access

    $57.59
Wikileaks recent data exposures demonstrate the danger now posed by insiders, who can often bypass physical and technical security measures designed to prevent unauthorized access. Insiders are already familiar with their organizations'policies, procedures, and technologies, and can often identify vulnerabilities more effectively than outside "hackers." Most IT security mechanisms are implemented primarily to defend against external threats, leaving potentially enormous vulnerabilities exposed. Now, the insider threat team at CERT, the world's leading information security experts, helps readers systematically identify, prevent, detect, and mitigate threats arising from inside the organization. Drawing on their advanced research with the US Secret Service and Department of Defense, as well as the world's largest database of insider attacks, the authors systematically address four key types of insider "cybercrime": national security espionage, IT sabotage, theft of intellectual property, and fraud. For each, they present an up-to-date crime profile: who typically commits these crimes (and why); relevant organizational issues; methods of attack, impacts, and precursors that could have warned the organization in advance. In addition to describing patterns that readers can use in their own organizations, the authors offer today's most effective psychological, technical, organizational, cultural, and process-based countermeasures.

You might also enjoy...



Please wait while the item is added to your bag...