Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Trzeciak, Randall"'
Autor:
Collins, Matthew, Theis, Michael, Trzeciak, Randall, Strozer, Jeremy, Clark, Jason, Costa, Daniel, Cassidy, Tracy, Albrethsen, Michael, Moore, Andrew
This fifth edition of the Common Sense Guide to Mitigating Insider Threats provides the most current recommendations of the CERT® Division (part of Carnegie Mellon University’s Software Engineering Institute), based on an expanded corpus of more t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::111ac239273b7b52e0ce808208081aca
Autor:
Theis, Michael, Trzeciak, Randall F., Costa, Daniel L., Moore, Andrew P., Miller, Sarah, Cassidy, Tracy, Claycomb, William R.
This sixth edition of the Common Sense Guide to Mitigating Insider Threats provides the current recommendations of the CERT Division (part of Carnegie Mellon University’s Software Engineering Institute), based on an expanded corpus of more than 1,5
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5deee5bb6fc2a719b53b83ecb82ffcc5
Autor:
Silowash, George J, Cappelli, Dawn M., Moore, Andrew P, Trzeciak, Randall F., Shimeall, Timothy, Flynn, Lori
This fourth edition of the Common Sense Guide to Mitigating Insider Threats provides the most current recommendations of the CERT® Program (part of Carnegie Mellon University's Software Engineering Institute), based on an expanded database of more t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0edd30bc6d1fb004d83f1b297fcdfdb4
Autor:
Collins, Matthew L., Theis, Michael C., Trzeciak, Randall F., Strozer, Jeremy R., Clark, Jason W., Costa, Daniel L., Cassidy, Tracy, Albrethsen, Michael J., Moore, Andrew Preston
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9886135d61e6c5142c30fc1de6a10270
This is the sixth entry in the Spotlight On series published by the CERT®?Insider Threat Center. Each entry focuses on a specific area of threat to organizations from their current or former employees, contractors, or business partners and presents
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4f5cfc46341869c3fedd86618c2bd161
Autor:
Allen, Julia H., Curtis, Pamela D., Mehravari, Nader, Moore, Andrew P, Partridge, Kevin G, Stoddard, Robert W., Trzeciak, Randall F.
Organizations that are using the CERT® Resilience Management Model and organizations that are considering using it want information about the business value of implementing resilience processes and practices, and how to determine which ones to imple
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8d145792e89252d735c890c47be2c8f6
Autor:
Moore, Andrew P, Cappelli, Dawn, Caron, Thomas C, Shaw, Eric D, Spooner, Derrick, Trzeciak, Randall F.
A study conducted by the CERT Program at Carnegie Mellon University's Software Engineering Institute analyzed hundreds of insider cyber crimes across U.S. critical infrastructure sectors. Follow-up work involved detailed group modeling and analysis o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ad5e197d5be575e65bbc0692da887bd6
https://doi.org/10.21236/ada589594
https://doi.org/10.21236/ada589594
Autor:
Hanley, Michael, Dean, Tyler, Schroeder, Will, Houy, Matt, Trzeciak, Randall F., Montelibano, Juan
Since 2001, the Insider Threat team at the Software Engineering Institute's CERT program has built an extensive library and comprehensive database containing more than 550 cases of insider crimes. More than 80 of those crimes involved theft of an org
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7fd9f16c664332b496b0a88be1bf326a
Autor:
Band, Stephen R., Cappelli, Dawn M., Fischer, Lynn F., Moore, Andrew P., Shaw, Eric D., Trzeciak, Randall F.
This report examines the psychological, technical, organizational, and contextual factors thought to contribute to at least two forms of insider trust betrayal: insider sabotage against critical information technology (IT) systems, and espionage. Sec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::433eee5917a753555651b6996f08af9f
Autor:
Jajodia, Sushil, Stolfo, Salvatore J., Bellovin, Steven M., Keromytis, Angelos D., Hershkop, Shlomo, Smith, Sean W., Sinclair, Sara, Moore, Andrew P., Cappelli, Dawn M., Trzeciak, Randall F.
Publikováno v:
Insider Attack & Cyber Security; 2008, p17-52, 36p