Understanding the insider threat : (Record no. 600215)

MARC details
000 -LEADER
fixed length control field 04276cam a2200517 i 4500
001 - CONTROL NUMBER
control field rnd000000000110385
003 - CONTROL NUMBER IDENTIFIER
control field RAND
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200811100943.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 041209s2004 caua b 100 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0833036807
027 ## - STANDARD TECHNICAL REPORT NUMBER
Standard technical report number RAND/CF-196-ARDA
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) a489030
037 ## - SOURCE OF ACQUISITION
Terms of availability $35.00
Form of issue paperback
040 ## - CATALOGING SOURCE
Original cataloging agency CstmoR
Transcribing agency CstmoR
043 ## - GEOGRAPHIC AREA CODE
Geographic area code n-us---
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number UB247
Item number .U53 2004
245 10 - TITLE STATEMENT
Title Understanding the insider threat :
Remainder of title proceedings of a March 2004 workshop /
Statement of responsibility, etc Richard C. Brackney, Robert H. Anderson.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE STATEMENTS
Place of production, publication, distribution, manufacture Santa Monica, CA :
Name of producer, publisher, distributor, manufacturer RAND,
Date of production, publication, distribution, manufacture 2004.
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 113 pages :
Other physical details illustrations ;
Dimensions 28 cm
336 ## - CONTENT TYPE
Content Type Term text
Content Type Code txt
Source rdacontent
337 ## - MEDIA TYPE
Media Type Term computer
Media Type Code c
Source rdamedia
337 ## - MEDIA TYPE
Media Type Term unmediated
Media Type Code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier Type Term online resource
Carrier Type Code cr
Source rdacarrier
338 ## - CARRIER TYPE
Carrier Type Term volume
Carrier Type Code nc
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Conference proceedings / RAND ;
Volume number/sequential designation 196
500 ## - GENERAL NOTE
General note "National Security Research Division."
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (p. 113).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- IC System Models -- Vulnerabilities and Exploits -- Attacker Models -- Event Characterization --
Miscellaneous information Appendix:
Title Workshop Invitation -- Workshop Agenda -- Links to Read-Ahead Materials -- Workshop Participants --
Miscellaneous information Presentation:
Title The Robert Hanssen Case: An Example of the Insider Threat to Sensitive U.S. Information Systems
Miscellaneous information Presentation:
Title Overview of the Results of a Recent ARDA Workshop on Cyber Indications and Warning
Miscellaneous information Presentation:
Title Intelink Factoids
Miscellaneous information Presentation:
Title Glass Box Analysis Project
Miscellaneous information Presentation:
Title Interacting with Information: Novel Intelligence from Massive Data.
520 ## - SUMMARY, ETC.
Summary, etc Perhaps the greatest threat that the intelligence community (IC) must address in the area of information assurance is the "insider threat"-malevolent (or possibly inadvertent) actions by an already trusted person with access to sensitive information and information systems. This document reports the results of a workshop that brought together IC members with specific knowledge of IC document management systems and IC business practices; persons with knowledge of insider attackers, both within and outside the IC; and researchers involved in developing technology to counter insider threats. Plenary and breakout sessions discussed various aspects of the problem, including intelligence community system models, vulnerabilities and exploits, attacker models, and event characterization. Participants listed the following challenges: defining an effective way of monitoring what people do with their cyber access; developing policies and procedures to create as bright a line as possible between allowed and disallowed behaviors; considering sociological and psychological factors and creating better cooperation between information systems personnel and human resources personnel; and combining events from one or more sensors (possibly of various types or different levels of abstraction) to facilitate building systems that test hypotheses about malicious insider activity. Workshop members also considered what databases would aid in this research if they were available.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available on the internet via WWW in PDF format.
588 ## -
-- Description based on print version record.
610 10 - SUBJECT ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element United States.
Subordinate unit Department of Defense
General subdivision Computer networks
-- Security measures
Form subdivision Congresses.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Command and control systems
General subdivision Security measures
Geographic subdivision United States
Form subdivision Congresses.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
Geographic subdivision United States
Form subdivision Congresses.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information services
General subdivision Security measures
Geographic subdivision United States
Form subdivision Congresses.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information warfare
Geographic subdivision United States
Form subdivision Congresses.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element National security
Geographic subdivision United States
Form subdivision Congresses.
651 #0 - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME
Geographic name United States
General subdivision Defenses
Form subdivision Congresses.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Brackney, Richard C.
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Anderson, Robert H.
Fuller form of name (Robert Helms),
Dates associated with a name 1939-
Relator term author.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Rand Corporation.
Subordinate unit National Security Research Division.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Rand Corporation.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Advanced Research and Development Activity.
711 2# - ADDED ENTRY--MEETING NAME
Meeting name or jurisdiction name as entry element Understanding the Insider Threat
Date of meeting (2004 :
Location of meeting McAfee Security, Rockville, MD)
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Conference proceedings (Rand Corporation) ;
Volume number/sequential designation 196.
856 41 - ELECTRONIC LOCATION AND ACCESS
Link text Online Access
Uniform Resource Identifier <a href="http://www.rand.org/publications/CF/CF196/">http://www.rand.org/publications/CF/CF196/</a>

No items available.

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu