PDF4PRO ⚡AMP

Modern search engine that looking for books and documents around the web

Example: bachelor of science

Analytic Approaches to Detect Insider Threats

Analytic Approaches TO Detect Insider Threats DECEMBER 9, 2015 TABLE OF CONTENTS EXECUTIVE SUMMARY .. 1 A. 3 1. BACKGROUND .. 3 2. OUTLINE .. 4 B. Insider THREAT PROGRAM OVERVIEW .. 5 1. INTRODUCTION .. 5 2. POLICY, PRIVACY, AND ETHICAL CONSIDERATIONS .. 5 3. LEGAL CONSIDERATIONS .. 6 4. COST CONSIDERATIONS .. 7 C. Insider THREAT AGENT AND ATTACK TYPES .. 7 D. Analytic INDICATORS .. 10 1. CONTEXT .. 10 2. Analytic 12 3. ACTIVITY-BASED ANALYTICS .. 13 a. System Indicators .. 14 b. Facility Indicators .. 18 c. Business Capabilities Indicators .. 18 4. CONTENT-BASED ANALYTICS .. 20 a. Social Analytics .. 20 b. Health Analytics .. 22 c. Human Resources Analytics .. 23 5. INFERENTIAL ANALYTICS .. 24 a. Financial 24 b. Security Analytics .. 25 c. Criminal Analytics .. 26 6. IMPORTANT ANALYTICS FOR ATTACK TYPES .. 27 E. Analytic PROCESS & INVESTIGATIONS .. 29 F. DATA SOURCES FOR ANALYTICS .. 29 1. DATA FROM SECURITY AND NETWORK COMPONENTS.

Insider threat is the potential for a current or former employee, contractor, or business partner to accidentally or maliciously misuse their trusted access to harm the organization’s employees , customers, assets, reputation,

Tags:

  Insider

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Spam in document Broken preview Other abuse

Transcription of Analytic Approaches to Detect Insider Threats

Related search queries