Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector

نویسندگان

  • Adam Cummings
  • Todd Lewellen
  • David McIntire
  • Andrew P. Moore
  • Randall Trzeciak
چکیده

xi

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Technical Report: Creating a Preliminary Cyber Ontology for Insider Threats in the Financial Sector

Insider attack has become a major threat in financial sector and is a very serious and pervasive security problem. Currently, there is no insider threat ontology in this domain and such an ontology is critical to developing countermeasures against insider attacks. In this paper, we create an ontology focusing on insider attacks in the banking domain targeting database systems. We define the tax...

متن کامل

Reflections on the Insider Threat

This paper reports on a workshop in June 2007 on the topic of the insider threat. Attendees represented academia and research institutions, consulting firms, industry—especially the financial services sector, and government. Most participants were from the United States. Conventional wisdom asserts that insiders account for roughly a third of the computer security loss. Unfortunately, there is ...

متن کامل

Insider Attack and Cyber Security Beyond the Hacker Advances in Information Security

This paper reports on a workshop in June 2007 on the topic of the insider threat. Attendees represented academia and research institutions, consulting firms, industry—especially the financial services sector, and government. Most participants were from the United States. Conventional wisdom asserts that insiders account for roughly a third of the computer security loss. Unfortunately, there is ...

متن کامل

Characterization and Planning for Computer Network Operations

Whom we e-mail, where we browse, what we purchase, and the things we search for on the World Wide Web all leave identifiable traces of who we are as individuals. In today’s technology focused landscape, cyberspace represents the new environment in which we communicate, work, shop, and play, and the cyber behaviors we exhibit there give a great deal of insight into our individual identities. Thi...

متن کامل

Second Annual Cyber Security and Information Infrastructure Research Workshop May 10 - 11 , 2006 BEYOND THE MAGINOT LINE

Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an inves...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012