0
Your cart

Your cart is empty

Books > Business & Economics > Business & management

Buy Now

Insider Threat - A Guide to Understanding, Detecting, and Defending Against the Enemy from Within (Paperback) Loot Price: R1,229
Discovery Miles 12 290
Insider Threat - A Guide to Understanding, Detecting, and Defending Against the Enemy from Within (Paperback): IT Governance

Insider Threat - A Guide to Understanding, Detecting, and Defending Against the Enemy from Within (Paperback)

IT Governance

 (sign in to rate)
Loot Price R1,229 Discovery Miles 12 290 | Repayment Terms: R115 pm x 12*

Bookmark and Share

Expected to ship within 18 - 22 working days

Insider Threat - A Guide to Understanding, Detecting, and Defending Against the Enemy from Within looks beyond perimeter protection tools, and shows how a security culture based on international best practice can help mitigate the insider threat to your security. It also provides some short-term quick fixes that can be applied as your organizations builds an effective insider threat programme. Read this book to learn: *The seven organizational characteristics common to insider threat victims. *The ten stages of a malicious attack. *The ten steps of a successful insider threat programme. *How to construct a three-tier security culture, encompassing artefacts, values and shared assumptions. Insider Threat details the measures that organizations can implement to ensure high-impact quick wins, mapping appropriate security controls from the ISO 27001, ISO 27002, and NIST SP 800-53 standards to the following points, and more: *Risk mitigation and the eight steps of a risk assessment *The importance of training and awareness, and conducting staff background screening *Monitoring and auditing the activities of general and privileged users, and quickly responding to suspicious behaviors *Metrics to measure insider threat behavior and mitigation *The challenge of external or temporary insiders (such as consultants, support contractors, partners, service providers, temporary employees) *Layering physical and digital defenses to provide defense in depth *The importance of conducting regular penetration testing to evaluate security controls *Limiting, monitoring and controlling remote access and mobile device use *Ensuring supply-chain security *Maintaining an incident management capability It also sets out what not to do, listing a set of worst practices that should be avoided.

General

Imprint: It Governance Publishing
Country of origin: United Kingdom
Release date: September 2016
Editors: IT Governance
Dimensions: 219 x 140 x 17mm (L x W x T)
Format: Paperback
Pages: 312
ISBN-13: 978-1-84928-839-2
Categories: Books > Business & Economics > Business & management > General
Promotions
LSN: 1-84928-839-9
Barcode: 9781849288392

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Partners