Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System

William T. Bai

ISBN 10: 1249449847 ISBN 13: 9781249449843
Editore: Bibliolife Sep 2012, 2012
Nuovi Taschenbuch

Da AHA-BUCH GmbH, Einbeck, Germania Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Venditore AbeBooks dal 14 agosto 2006

Questo articolo specifico non è più disponibile.

Riguardo questo articolo

Descrizione:

Neuware - Insider threats can pose a great risk to organizations and by their very nature are difficult to protect against. Auditing and system logging are capabilities present in most operating systems and can be used for detecting insider activity. However, current auditing methods are typically applied in a haphazard way, if at all, and are not conducive to contributing to an effective insider threat security policy. This research develops a methodology for designing a customized auditing and logging template for a Linux operating system. An intent-based insider threat risk assessment methodology is presented to create use case scenarios tailored to address an organization's specific security needs and priorities. These organization specific use cases are verified to be detectable via the Linux auditing and logging subsystems and the results are analyzed to create an effective auditing rule set and logging configuration for the detectable use cases. Results indicate that creating a customized auditing rule set and system logging configuration to detect insider threat activity is possible. Codice articolo 9781249449843

Segnala questo articolo

Riassunto:

Insider threats can pose a great risk to organizations and by their very nature are difficult to protect against. Auditing and system logging are capabilities present in most operating systems and can be used for detecting insider activity. However, current auditing methods are typically applied in a haphazard way, if at all, and are not conducive to contributing to an effective insider threat security policy. This research develops a methodology for designing a customized auditing and logging template for a Linux operating system. An intent-based insider threat risk assessment methodology is presented to create use case scenarios tailored to address an organization's specific security needs and priorities. These organization specific use cases are verified to be detectable via the Linux auditing and logging subsystems and the results are analyzed to create an effective auditing rule set and logging configuration for the detectable use cases. Results indicate that creating a customized auditing rule set and system logging configuration to detect insider threat activity is possible.

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

Dati bibliografici

Titolo: Development of a Methodology for Customizing...
Casa editrice: Bibliolife Sep 2012
Data di pubblicazione: 2012
Legatura: Taschenbuch
Condizione: Neu

I migliori risultati di ricerca su AbeBooks