Matches in DBpedia 2014 for { <http://dbpedia.org/resource/Cyber_Insider_Threat> ?p ?o. }
Showing items 1 to 16 of
16
with 100 items per page.
- Cyber_Insider_Threat abstract "Cyber Insider Threat, or CINDER, is a philosophy of analyzing computer security threats that assumes the threats are from 'insiders' who already have access to a system, rather than attackers outside the system. The CINDER threat is unlike other vulnerability based attacks in that the action taken by the initiator is not based on unauthorized access by unauthorized objects or authorized objects, it is based on the concept that authorized access by authorized objects will normally occur (along with their subsequent actions) within the security boundary. This object action will not be viewed as an attack, but normal use when analyzed by standard IDS-IPS, logging and expert systems. The CINDER Mission will be seen as an unauthorized disclosure once data exfiltration has been realized. At that time, the resultant CINDER Case would change all object actions related to the disclosure from “Authorized Use by an Authorized Object” to “Unauthorized Use by an Authorized Object”.Note: For the initial CINDER case, the controlling agent”. will still be seen as an Authorized Object based on the fact that the security system has passed an evaluation for Assurance and Functionality.The Cyber Insider Threat has continued to be a known issue since the mid-1980s. The following NIST material dated March 1994 - Internal Threats, shows how it was defined in its infancy."System controls are not well matched to the average organization's security policy. As a direct result, the typical user is permitted to circumvent that policy on a frequent basis. The administrator is unable to enforce the policy because of the weak access controls, and cannot detect the violation of policy because of weak audit mechanisms. Even if the audit mechanisms are in place, the daunting volume of data produced makes it unlikely that the administrator will detect policy violations. Ongoing research in integrity and intrusion detection promise to fill some of this gap. Until these research projects become available as products, systems will remain vulnerable to internal threats."".
- Cyber_Insider_Threat wikiPageID "33969177".
- Cyber_Insider_Threat wikiPageRevisionID "604955801".
- Cyber_Insider_Threat hasPhotoCollection Cyber_Insider_Threat.
- Cyber_Insider_Threat subject Category:Computer_forensics.
- Cyber_Insider_Threat subject Category:Computer_security.
- Cyber_Insider_Threat subject Category:Computer_security_exploits.
- Cyber_Insider_Threat subject Category:Computer_surveillance.
- Cyber_Insider_Threat subject Category:Data_security.
- Cyber_Insider_Threat comment "Cyber Insider Threat, or CINDER, is a philosophy of analyzing computer security threats that assumes the threats are from 'insiders' who already have access to a system, rather than attackers outside the system.".
- Cyber_Insider_Threat label "Cyber Insider Threat".
- Cyber_Insider_Threat sameAs m.0hn9dr4.
- Cyber_Insider_Threat sameAs Q5197715.
- Cyber_Insider_Threat sameAs Q5197715.
- Cyber_Insider_Threat wasDerivedFrom Cyber_Insider_Threat?oldid=604955801.
- Cyber_Insider_Threat isPrimaryTopicOf Cyber_Insider_Threat.