2013
DOI: 10.21236/ada610587
|View full text |Cite
|
Sign up to set email alerts
|

Insider Threat Control: Understanding Data Loss Prevention (DLP) and Detection by Correlating Events from Multiple Sources

Abstract: ix Tables Table 1: Instructions for Creating a New Auditing Policy 6 AbstractRemovable media, such as universal serial bus (USB) flash drives, present unique problems to the enterprise since insiders can use such media to remove proprietary information from company systems. Insiders may do this for legitimate reasons, such as to work on material at home, or they may do so for malicious reasons, such as to steal intellectual property.Organizations must establish and implement effective methods and processe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 1 publication
0
10
0
Order By: Relevance
“…Many access mechanisms, such as universal serial bus (USB) drives or bring your own device (BYOD) technologies [21], allow for work mobility but may be used to steal intellectual property. [34] Here, the best advice of "awareness within the organization and at home" is unavailing, as "nothing will stop a determined user from clicking a link or installing something" [22] once they have determined a path forward-especially when that path includes intentional deceit.…”
Section: Data Loss According To Internal and External Stakeholders Lmentioning
confidence: 99%
“…Many access mechanisms, such as universal serial bus (USB) drives or bring your own device (BYOD) technologies [21], allow for work mobility but may be used to steal intellectual property. [34] Here, the best advice of "awareness within the organization and at home" is unavailing, as "nothing will stop a determined user from clicking a link or installing something" [22] once they have determined a path forward-especially when that path includes intentional deceit.…”
Section: Data Loss According To Internal and External Stakeholders Lmentioning
confidence: 99%
“…Sources, the use of removable media presents unique problems to the enterprise since insiders can use such media to remove proprietary information from company systems [1]. Insiders may do this for legitimate reasons, such as to work on material at home, or they may do so for malicious reasons, such as to steal intellectual property.…”
Section: As Discussed In a Prior Software Engineering Institute (Sei)mentioning
confidence: 99%
“…® CERT is a registered trademark owned by Carnegie Mellon University. 1 We discuss OSSEC further in Section 2.5, and we present background about and uses for Splunk in Section 5.…”
Section: As Discussed In a Prior Software Engineering Institute (Sei)mentioning
confidence: 99%
See 1 more Smart Citation
“…But really only two of these are 'real' Registry keys. The others are aliases to branches within one of the two hives as [13][14][15][16][17][18] Windows Registry stores these data on a disk in several hive files. Just like a file system, Registry hive files contain clusters of data.…”
Section: Windows Registry Structurementioning
confidence: 99%