Insider threats and attacks : detection and prevention.
(Unknown)
Contributors
Published
[San Francisco, California, USA] : Kanopy Streaming, 2014.
Format
Unknown
Physical Desc
1 online resource (1 video file, approximately 21 min.) : digital, .flv file, sound
Status
Unavailable/Withdrawn
Description
Loading Description...
Also in this Series
Checking series information...
Subjects
LC Subjects
More Details
Language
English
Notes
General Note
Title from title frames.
Date/Time and Place of Event
Originally produced by SmartPros in 2012.
Description
Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled employees or malicious business partners, they can be very costly and difficult for the organization to recover from. In this report Jason Mical, Director of Network Forensics at AccessData, offers advice and best practices to help organizations reduce the risk of a successful insider attack on enterprise data, systems and networks. Track: Technical briefings in-depth information on new technologies, techniques and solution providers. Learning objectives: Understand the nature of an insider-attack and the profile of a typical attacker. Discuss insider-attack methods and the systems and applications that may be particularly vulnerable to malicious attacks. Explain ways organizations can reduce the risk of an insider attack.
System Details
Mode of access: World Wide Web.
Citations
APA Citation, 7th Edition (style guide)
(2014). Insider threats and attacks: detection and prevention . Kanopy Streaming.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)2014. Insider Threats and Attacks: Detection and Prevention. Kanopy Streaming.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Insider Threats and Attacks: Detection and Prevention Kanopy Streaming, 2014.
MLA Citation, 9th Edition (style guide)Insider Threats and Attacks: Detection and Prevention Kanopy Streaming, 2014.
Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.
Staff View
Grouped Work ID
63ca084c-c27c-701f-8821-960420ee0145-eng
Grouping Information
Grouped Work ID | 63ca084c-c27c-701f-8821-960420ee0145-eng |
---|---|
Full title | insider threats and attacks detection and prevention |
Author | kanopy |
Grouping Category | movie |
Last Update | 2022-07-05 21:15:06PM |
Last Indexed | 2024-04-17 03:32:51AM |
Book Cover Information
Image Source | sideload |
---|---|
First Loaded | Jun 14, 2021 |
Last Used | Jun 15, 2021 |
Marc Record
First Detected | Feb 04, 2014 12:00:00 AM |
---|---|
Last File Modification Time | Aug 03, 2021 03:10:50 AM |
MARC Record
LEADER | 02303ngm a22003491i 4500 | ||
---|---|---|---|
001 | kan1089919 | ||
003 | CaSfKAN | ||
005 | 20140204133419.0 | ||
006 | m o c | ||
007 | vz uzazuu | ||
007 | cr una---unuuu | ||
008 | 140807p20142012cau020 o vleng d | ||
028 | 5 | 2 | |a 1089919|b Kanopy |
035 | |a (OCoLC)897770069 | ||
040 | |a UtOrBLW|b eng|e rda|c UtOrBLW | ||
245 | 0 | 0 | |a Insider threats and attacks :|b detection and prevention. |
264 | 1 | |a [San Francisco, California, USA] :|b Kanopy Streaming,|c 2014. | |
300 | |a 1 online resource (1 video file, approximately 21 min.) :|b digital, .flv file, sound | ||
336 | |a two-dimensional moving image|2 rdacontent | ||
337 | |a computer|2 rdamedia | ||
338 | |a online resource|2 rdacarrier | ||
344 | |a digital | ||
347 | |a video file|b MPEG-4|b Flash | ||
500 | |a Title from title frames. | ||
518 | |a Originally produced by SmartPros in 2012. | ||
520 | |a Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled employees or malicious business partners, they can be very costly and difficult for the organization to recover from. In this report Jason Mical, Director of Network Forensics at AccessData, offers advice and best practices to help organizations reduce the risk of a successful insider attack on enterprise data, systems and networks. Track: Technical briefings in-depth information on new technologies, techniques and solution providers. Learning objectives: Understand the nature of an insider-attack and the profile of a typical attacker. Discuss insider-attack methods and the systems and applications that may be particularly vulnerable to malicious attacks. Explain ways organizations can reduce the risk of an insider attack. | ||
538 | |a Mode of access: World Wide Web. | ||
650 | 0 | |a Cyberterrorism. | |
650 | 0 | |a Computer science. | |
710 | 2 | |a Kanopy (Firm) | |
856 | 4 | 0 | |u https://uintahlibrary.kanopy.com/node/89920|z A Kanopy streaming video |
856 | 4 | 2 | |z Cover Image|u https://www.kanopy.com/node/89920/external-image |