Best Practices against Insider Threats for All Nations

被引:0
作者
Flynn, Lori [1 ]
Huth, Carly [1 ]
Trzeciak, Randy [1 ]
Buttles, Palma [1 ]
机构
[1] Carnegie Mellon Univ, Inst Software Engn, CERT Program, Pittsburgh, PA 15213 USA
来源
2012 THIRD WORLDWIDE CYBERSECURITY SUMMIT (WCS) | 2012年
关键词
Insider threat; best practices; international; policies; security; information security; cultures; education;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Individuals in any nation can use this paper as 1. an exploration of international policy issues related to insider threats and other cybersecurity concerns; and 2. a succinct educational guide to practices for stopping insider threats. A framework for international analysis of cybersecurity practices is introduced. Based on its analysis of more than 700 case studies, the CERT (R) Insider Threat Center recommends 19 best practices for preventing, detecting, and responding to harm from insider threats. This paper summarizes each practice, explains its importance, and provides an international policy perspective on the practice.
引用
收藏
页数:8
相关论文
共 22 条
[1]  
[Anonymous], 2011, Technical Note CMU/SEI-2011-TN-024
[2]  
[Anonymous], WORLD FACTB
[3]  
[Anonymous], 2010, CULTURE ORG SOFTWARE
[4]  
[Anonymous], RISK MAN MAN EX POL
[5]  
Bishop M., 2008, Proceedings of the 4th Annual Workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead, P15
[6]  
Central Intelligence Agency (CIA) of the U.S.A, CIA WORLD FACTB
[7]  
Cohen Eyal Ben, 2010, NAVIGATING INT BACKG
[8]  
Data Protection Working Party, 2011, DATA PROTECTION WORK
[9]  
Federal Trade Commission, 2006, FIN I CUST INF COMPL
[10]  
Guess D., 2004, ONLINE READINGS PSYC, V4