Item Details

Print View

Insider Threats and Attacks: Detection and Prevention

Kanopy (Firm)
Format
Video; Streaming Video; Online
Summary
Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled employees or malicious business partners, they can be very costly and difficult for the organization to recover from. In this report Jason Mical, Director of Network Forensics at AccessData, offers advice and best practices to help organizations reduce the risk of a successful insider attack on enterprise data, systems and networks. Track: Technical briefings in-depth information on new technologies, techniques and solution providers. Learning objectives: Understand the nature of an insider-attack and the profile of a typical attacker. Discuss insider-attack methods and the systems and applications that may be particularly vulnerable to malicious attacks. Explain ways organizations can reduce the risk of an insider attack.
Release Date
2012
Language
English
Notes
Title from title frames.
Published
[San Francisco, California, USA] : Kanopy Streaming, 2014.
Recording Info
Originally produced by SmartPros in 2012.
Publisher no.
1089919 Kanopy
Related Resources
Cover Image
Description
1 online resource (1 video file, approximately 21 min.) : digital, .flv file, sound
Mode of access: World Wide Web.
Technical Details
  • Staff View

    LEADER 02315ngm a22003491i 4500
    001 kan1089919
    003 CaSfKAN
    005 20140204133419.0
    006 m o c
    007 vz uzazuu
    007 cr una---unuuu
    008 140807p20142012cau020 o vleng d
    028
    5
    2
    a| 1089919 b| Kanopy
    035
      
      
    a| (OCoLC)897770069
    040
      
      
    a| UtOrBLW b| eng e| rda c| UtOrBLW
    245
    0
    0
    a| Insider threats and attacks : b| detection and prevention.
    264
      
    1
    a| [San Francisco, California, USA] : b| Kanopy Streaming, c| 2014.
    300
      
      
    a| 1 online resource (1 video file, approximately 21 min.) : b| digital, .flv file, sound
    336
      
      
    a| two-dimensional moving image 2| rdacontent
    337
      
      
    a| computer 2| rdamedia
    338
      
      
    a| online resource 2| rdacarrier
    344
      
      
    a| digital
    347
      
      
    a| video file b| MPEG-4 b| Flash
    500
      
      
    a| Title from title frames.
    518
      
      
    a| Originally produced by SmartPros in 2012.
    520
      
      
    a| Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled employees or malicious business partners, they can be very costly and difficult for the organization to recover from. In this report Jason Mical, Director of Network Forensics at AccessData, offers advice and best practices to help organizations reduce the risk of a successful insider attack on enterprise data, systems and networks. Track: Technical briefings in-depth information on new technologies, techniques and solution providers. Learning objectives: Understand the nature of an insider-attack and the profile of a typical attacker. Discuss insider-attack methods and the systems and applications that may be particularly vulnerable to malicious attacks. Explain ways organizations can reduce the risk of an insider attack.
    538
      
      
    a| Mode of access: World Wide Web.
    650
      
    0
    a| Cyberterrorism.
    650
      
    0
    a| Computer science.
    710
    2
      
    a| Kanopy (Firm)
    856
    4
    0
    u| http://proxy.its.virginia.edu/login?url=http://virginia.kanopystreaming.com/node/89920 z| A Kanopy streaming video
    856
    4
    2
    z| Cover Image u| http://proxy.its.virginia.edu/login?url=https://www.kanopystreaming.com/node/89920/external-image
    999
      
      
    w| WEB l| INTERNET m| UVA-LIB t| INTERNET
▾See more
▴See less

Availability

Google Preview

Google Books Preview