Gateway to Think Tanks
来源类型 | Conference Proceedings |
规范类型 | 其他 |
ISBN | 0-8330-2962-2 |
来源ID | CF-163-DARPA |
Research on Mitigating the Insider Threat to Information Systems - #2: Proceedings of a Workshop Held August, 2000 | |
Robert H. Anderson; Thomas Bozek; Tom Longstaff; Wayne Meitzler; Michael Skroch; Ken Van Wyk | |
发表日期 | 2000 |
出版年 | 2000 |
页码 | 134 |
语种 | 英语 |
摘要 | This is the second in a series of conference reports on the topic of R&D initiatives to mitigate and thwart the insider threat to critical U.S. defense and infrastructure information systems. (The first conference, held August 1999, is reported on in RAND/CF-151-OSD.) This August 2000 workshop's three main focus areas were long-term (2-5 year) research challenges and goals toward mitigating the insider threat; developing insider threat models; and developing near-term solutions using commercial off-the-shelf(COTS) and government off-the-shelf (GOTS) products. The long-term research recommendations stressed the need to develop an underlying system architecture designed explicitly with security and survivability in mind (unlike essentially all operating systems and network architectures in use today). Other topics included R&D needed on differential access controls, means of recording and saving the provenance of a digital document, and dealing with the increasing use of mobile code (e.g., in the form of applets, viruses, worms, or macros) in complex information systems. The report also contains a number of recommendations regarding the purposes and design of models of insider behavior, and near-term recommendations for helping to prevent, discover, and mitigate the threat ofinsider misuse of information systems. |
主题 | Computer Viruses ; Critical Infrastructure Protection ; Cybercrime ; Cybersecurity ; Defense Infrastructure |
URL | https://www.rand.org/pubs/conf_proceedings/CF163.html |
来源智库 | RAND Corporation (United States) |
资源类型 | 智库出版物 |
条目标识符 | http://119.78.100.153/handle/2XGU8XDN/111309 |
推荐引用方式 GB/T 7714 | Robert H. Anderson,Thomas Bozek,Tom Longstaff,et al. Research on Mitigating the Insider Threat to Information Systems - #2: Proceedings of a Workshop Held August, 2000. 2000. |
条目包含的文件 | ||||||
文件名称/大小 | 资源类型 | 版本类型 | 开放类型 | 使用许可 | ||
conf_proceedings.gif(2KB) | 智库出版物 | 限制开放 | CC BY-NC-SA | 浏览 | ||
CF163.pdf(5456KB) | 智库出版物 | 限制开放 | CC BY-NC-SA | 浏览 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。