G2TT
来源类型Conference Proceedings
规范类型其他
ISBN0-8330-2962-2
来源IDCF-163-DARPA
Research on Mitigating the Insider Threat to Information Systems - #2: Proceedings of a Workshop Held August, 2000
Robert H. Anderson; Thomas Bozek; Tom Longstaff; Wayne Meitzler; Michael Skroch; Ken Van Wyk
发表日期2000
出版年2000
页码134
语种英语
摘要

This is the second in a series of conference reports on the topic of R&D initiatives to mitigate and thwart the insider threat to critical U.S. defense and infrastructure information systems. (The first conference, held August 1999, is reported on in RAND/CF-151-OSD.) This August 2000 workshop's three main focus areas were long-term (2-5 year) research challenges and goals toward mitigating the insider threat; developing insider threat models; and developing near-term solutions using commercial off-the-shelf(COTS) and government off-the-shelf (GOTS) products. The long-term research recommendations stressed the need to develop an underlying system architecture designed explicitly with security and survivability in mind (unlike essentially all operating systems and network architectures in use today). Other topics included R&D needed on differential access controls, means of recording and saving the provenance of a digital document, and dealing with the increasing use of mobile code (e.g., in the form of applets, viruses, worms, or macros) in complex information systems. The report also contains a number of recommendations regarding the purposes and design of models of insider behavior, and near-term recommendations for helping to prevent, discover, and mitigate the threat ofinsider misuse of information systems.

主题Computer Viruses ; Critical Infrastructure Protection ; Cybercrime ; Cybersecurity ; Defense Infrastructure
URLhttps://www.rand.org/pubs/conf_proceedings/CF163.html
来源智库RAND Corporation (United States)
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/111309
推荐引用方式
GB/T 7714
Robert H. Anderson,Thomas Bozek,Tom Longstaff,et al. Research on Mitigating the Insider Threat to Information Systems - #2: Proceedings of a Workshop Held August, 2000. 2000.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
conf_proceedings.gif(2KB)智库出版物 限制开放CC BY-NC-SA浏览
CF163.pdf(5456KB)智库出版物 限制开放CC BY-NC-SA浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Robert H. Anderson]的文章
[Thomas Bozek]的文章
[Tom Longstaff]的文章
百度学术
百度学术中相似的文章
[Robert H. Anderson]的文章
[Thomas Bozek]的文章
[Tom Longstaff]的文章
必应学术
必应学术中相似的文章
[Robert H. Anderson]的文章
[Thomas Bozek]的文章
[Tom Longstaff]的文章
相关权益政策
暂无数据
收藏/分享
文件名: conf_proceedings.gif
格式: GIF
文件名: CF163.pdf
格式: Adobe PDF

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。