Insider Threat Mitigation Guide_Final_508信息安全资料.pdfVIP

Insider Threat Mitigation Guide_Final_508信息安全资料.pdf

  1. 1、本文档被系统程序自动判定探测到侵权嫌疑,本站暂时做下架处理。
  2. 2、如果您确认为侵权,可联系本站左侧在线QQ客服请求删除。我们会保证在24小时内做出处理,应急电话:400-050-0827。
  3. 3、此文档由网友上传,因疑似侵权的原因,本站不提供该文档下载,只提供部分内容试读。如果您是出版社/作者,看到后可认领文档,您也可以联系本站进行批量认领。
查看更多

InsiderThreat

MitigationGuide

NOVEMBER2020

CybersecurityandInfrastructureSecurityAgency

[Thispageleftintentionallyblank]

InsiderThreatMitigationGuide

TableofContents

LetterfromtheActingAssistantDirectorv

Introduction1

CostsofInsiderThreats2

ReturnonInvestmentforInsiderThreatMitigationPrograms4

InsiderThreatMitigationProgram5

DefiningInsiderThreats8

DefinitionofanInsider9

DefinitionofInsiderThreat10

TypesofInsiderThreats12

ExpressionsofInsiderThreat13

ConcludingThoughts18

KeyPoints19

BuildinganInsiderThreatMitigationProgram20

CharacteristicsofanEffectiveInsiderThreatMitigationProgram21

CorePrinciples23

KeysforSuccess26

EstablishinganInsiderThreatMitigationProgram28

ConcludingThoughts51

KeyPoints54

DetectingandIdentifyingInsiderThreats56

ThreatDetectionandIdentification57

ProgressionofanInsiderThreatTowardaMaliciousIncident58

ThreatDetectors61

ThreatIndicators63

ConcludingThoughts70

KeyPoints72

AssessingInsiderThreats73

AssessmentProcess74

ViolenceinThreatAssessment80

Profiles–NoUsefulProfileinThreatAssessment83

CybersecurityandInfrastru

文档评论(0)

qd002 + 关注
实名认证
文档贡献者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档