Wonder Club world wonders pyramid logo
×

Research on mitigating the insider threat to information systems--#2 Book

Research on mitigating the insider threat to information systems--#2
Research on mitigating the insider threat to information systems--#2, , Research on mitigating the insider threat to information systems--#2 has a rating of 3 stars
   2 Ratings
X
Research on mitigating the insider threat to information systems--#2, , Research on mitigating the insider threat to information systems--#2
3 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
100 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Research on mitigating the insider threat to information systems--#2
  • Written by author Robert H. Anderson, National Defense Research Institute U.S
  • Published by Santa Monica, Calif. : RAND, c2000., January 2000
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

This is the second in a series of conference reports on the topic of R&D initiatives to mitigate and thwart the insider threat to critical U.S. defense and infrastructure information systems. This workshop's main focus areas were long-term research challenges and goals toward mitigating the insider threat; developing insider threat models; and developing near-term solutions using commercial off-the-shelf and government off-the-shelf products. The long-term research recommendations stressed the need to develop underlying system architecture designed explicitly with security and survivability in mind. The report also contains a number of recommendations regarding the purposes and design of models of insider behavior, and near-term recommendations for helping to prevent, discover, and mitigate the threat of insider misuse of information systems.


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Research on mitigating the insider threat to information systems--#2, , Research on mitigating the insider threat to information systems--#2

X
WonderClub Home

This item is in your Collection

Research on mitigating the insider threat to information systems--#2, , Research on mitigating the insider threat to information systems--#2

Research on mitigating the insider threat to information systems--#2

X
WonderClub Home

This Item is in Your Inventory

Research on mitigating the insider threat to information systems--#2, , Research on mitigating the insider threat to information systems--#2

Research on mitigating the insider threat to information systems--#2

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: