Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT AttacksAn organization‘s employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider Comput |
What people are saying - Write a review
We haven't found any reviews in the usual places.
Contents
Chapter 1 Insider Computer Fraud ICF | 1 |
Chapter 2 Related Research in Insider Computer Fraud and Information Security Controls | 9 |
Chapter 3 The Insider Threat Strategic Planning Process | 27 |
Chapter 4 Information Technology Architecture and Insider Computer Fraud Prevention | 103 |
Chapter 5 Protection of Web Sites from Insider Abuse and the Information Technology Infrastructure | 113 |
Chapter 6 Web Services Security and Control Considerations for Reducing Transaction Risks | 123 |
Chapter 7 Application Security and Methods for Reducing Insider Computer Fraud | 135 |
Chapter 8 Insider Computer Fraud Taxonomy and the Art of the Key Fraud Indicator KFI Selection Process | 185 |
Application Data OriginationInput | 391 |
Application Data Processing | 403 |
Application OutputManagement Information System MIS | 409 |
Key Fraud Signature KFS Worksheet | 417 |
CyberSecurity HealthCheck | 423 |
Acronym List | 441 |
Glossary | 445 |
Contributors | 455 |
Chapter 9 Key Fraud Signature KFS Selection Process for Detecting Insider Computer Fraud | 237 |
Chapter 10 Application and System Journaling and the Software Engineering Process | 313 |
Chapter 11 The Role of Neural Networks in the Insider Computer Fraud Framework | 347 |
Application Access Controls | 371 |
Other editions - View all
Insider Computer Fraud: An In-depth Framework for Detecting and Defending ... Kenneth Brancik No preview available - 2007 |
Common terms and phrases
Access Controls Admin/sum data Financial analysis application or system application risk application security applications and systems Architecture audit Bal_C&I FinData AppCfficer behavior candidate attributes data chapter computer forensics computer fraud system control points data and metadata data Financial statements database Defense in Depth determine document employee ensure evaluating external files Financial statements FinData_SSN FinData AppCfficer FinData_Ln_Officer firewalls Forensic Foto Frame ICF activities identify impact individual insider information security InfoSec input insider attacks insider computer fraud insider loan insider threat integrity internal intrusion detection systems involved Key Fraud Signature KFI candidate attributes layer manipulation misuse monitoring neural network NPPI operating system organization output password penetration test policies potential reports residual risk Review risk assessment risk assessment process server Service Oriented Architecture software engineering system and data Table Taxonomy Threat Assessment tion transaction Unauthorized system access vulnerabilities