Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Silowash, George"'
Autor:
Costa, Daniel, Albrethsen, Michael, Collins, Matthew, Perl, Samuel, Silowash, George, Spooner, Derrick
The insider threat community currently lacks a standardized method of expression for indicators of potential malicious insider activity. We believe that communicating potential indicators of malicious insider activity in a consistent and commonly acc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5dffc1f4cdcd3b974310989b0c5c7465
Autor:
Silowash, George J, Cappelli, Dawn M., Moore, Andrew P, Trzeciak, Randall F., Shimeall, Timothy, Flynn, Lori
This fourth edition of the Common Sense Guide to Mitigating Insider Threats provides the most current recommendations of the CERT® Program (part of Carnegie Mellon University's Software Engineering Institute), based on an expanded database of more t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0edd30bc6d1fb004d83f1b297fcdfdb4
This technical note explores free and low cost technical solutions to help organizations prevent, detect, and respond to malicious insiders. The tools presented address the needs of organizations to have, at a minimum, user activity monitoring, data
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::71845bb8cac61582bb307ac98bb5199b
Autor:
Flynn, Lori, Huth, Carly, Buttles, Palma, Theis, Michael, Silowash, George J, Cassidy, Tracy, Wright, Travis, Trzeciak, Randy
This report analyzes insider threat mitigation in India and Germany, using the new framework for international cybersecurity analysis described in the paper titled "Best Practices Against Insider Threats in All Nations," applying the framework to spe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2037bdc95114fa80852ae0b0da06b799
https://doi.org/10.21236/ada609914
https://doi.org/10.21236/ada609914
Web-based services, such as email, are useful for communicating with others either within or outside of an organization; however, they are a common threat vector through which data exfiltration can occur. Despite this risk, many organizations permit
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8d5c46c07aa72f06e641322a172db687
Autor:
Silowash, George J, Lewellen, Todd
Universal serial bus (USB) storage devices are useful for transferring information within an organization; however, they are a common threat vector through which data exfiltration can occur. Despite this, many organizations permit the use of USB devi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::174d41ac7bdefe225616019292a5a87e
Autor:
Silowash, George J
Malicious insiders pose a threat to the confidentiality, integrity, and availability of an organization’s information. Many organizations look for hardware and software solutions that address insider threats but are unsure of what characteristics t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::042dfd229f9a5ec94ea85c59061fb7d0