|
Showing 1 - 6 of
6 matches in All Departments
Trusted employees pose a major threat to information systems.
Despite ad-vances in prevention, detection, and response
techniques, the number of maliciousinsider incidents and their
associated costs have yet to decline. There are very
fewvulnerability and impact models capable of providing information
owners with theability to comprehensively assess the effectiveness
an organization's malicious insidermitigation strategies.This
research uses a multi-dimensional approach: content analysis,
attack treeframework, and an intent driven taxonomy model are used
to develop a maliciousinsider Decision Support System (DSS) tool.
The tool's output provides an assess-ment of a malicious insider's
composite vulnerability levels based upon aggregatedvulnerability
assessment and impact assessment levels.The DSS tool's utility and
applicability is demonstrated using a notional ex-ample. This
research gives information owners data to more appropriately
allocatescarce security resources.
From heart-stopping accounts of apparitions and manifestations, to
eerie encounters with phantoms and spirits, this collection of
stories reveals Bedford's darker side. Drawing on historical and
contemporary sources, Haunted Bedford examines some of the lively
characters that are said to haunt the town, including the ghost of
famous author John Bunyan and Black Tom the highwayman, who was
executed here. Including original research on haunted sites, one of
which has only ever been investigated by the author, this book is
sure to fascinate everyone interested in the supernatural history
of the area.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.