نتایج جستجو برای: Threat

تعداد نتایج: 52909  

2010
Christian W. Probst Jeffrey Hunker Dieter Gollmann Matt Bishop

The insider threat has received considerable attention, and is often cited as the most serious security problem. It is also considered the most difficult problem to deal with, because an “insider” has information and capabilities not known to external attackers. The difficulty in handling the insider threat is reasonable under those circumstances; if one cannot define a problem precisely, how c...

2012
Adam Cummings Todd Lewellen David McIntire Andrew P. Moore Randall Trzeciak

xi

Journal: :ICST Trans. Security Safety 2013
Dee H. Andrews Jared Freeman Terence S. Andre John Feeney Alan Carlin Cali M. Fidopiastis Patricia Fitzgerald

Cyber insider threat is intentional theft from, or sabotage of, a cyber system by someone within the organization. This article explores the use of advanced cognitive and instructional principles to accelerate learning in organizational supervisors to mitigate the cyber threat. It examines the potential advantage of using serious games to engage supervisors. It also posits two systematic instru...

Journal: :گام های توسعه در آموزش پزشکی 0
حسین صافی زاده hossein safizadeh متخصص پزشکی اجتماعی، استادیار گروه پزشکی اجتماعی، دانشکده پزشکی، دانشگاه علوم پزشکی کرمان، کرمان، ایران

0

2006
Vassilios Stathopoulos Panayiotis Kotzanikolaou Emmanouil Magkos

In this paper we are focusing on secure logging for public network providers. We review existing security threat models against system logging and we extend these to a new threat model especially suited in the environment of telecommunication network providers. We also propose a framework for secure logging in public communication networks as well as realistic implementations designs, which are...

2011
Clive Blackwell

A computer incident occurs in a larger context than just a computer network. Because of this, investigators need a holistic forensic framework to analyze incidents in their entire context. This paper presents a framework that organizes incidents into social, logical and physical levels in order to analyze them in their entirety (including the human and physical factors) rather than from a purel...

2008
Xun Dong John A. Clark Jeremy L. Jacob

User authentication can be compromised both by subverting the system and by subverting the user; the threat modelling of the former is well studied, the latter less so. We propose a method to determine opportunities to subvert the user allowing vulnerabilities to be systematically identified. The method is applied to VeriSign’s OpenID authentication mechanism.

Journal: :JoWUA 2014
William R. Claycomb Philip A. Legg Dieter Gollmann

The insider threat is one of mankind’s most enduring security challenges. For as long as people have placed trust in one other, they have faced the risk of that trust being violated. Historically, consequences of insider attacks included compromised organizational security, financial loss, and risks to human health and safety. Prior to the information age, attacks mainly targeted tangible asset...

2008
Matt Bishop Dieter Gollmann Jeffrey Hunker Christian W. Probst D. Gollmann J. Hunker C. W. Probst

This article summarizes the objectives and structure of a seminar with the same title, held from July 20th to July 25th, 2008, at Schloss Dagstuhl, Germany. The seminar brought together researchers and policy-makers from all involved communities, to clarify what it is that identifies an insider threat, and to develop a common vision of how an insider can be categorized as well as an integrated ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید