Lecture 24: The Insider
Date
: November 22, 2013
Homework due
: Dec. 6 at 5:00pm
What is an “insider”?
Masquerader
Traitor
Notion of “perimeter”
Types of insider attacks
Misuse of access
Bypassing defenses
Access control failure
Technological solutions: detection
Policy languages (especially formal ones)
Misuse and anomaly techniques
Decoys
Markers
Data exfiltration prevention
Access controls (especially Role-Based Access Control, RBAC)
Trusted systems
Human solutions: detection and prevention
Policies: languages and hierarchies
Monitoring
Forensics
Human solutions: predictive
Taxonomies and their uses
Attack-related symptoms and behaviors
Semantic analysis
Motivational analysis
Legal considerations
Response
You can also obtain a PDF version of this.
Version of November 22, 2013 at 12:37PM