The Resource Insider threats and attacks : detection and prevention, (online streaming)

Insider threats and attacks : detection and prevention, (online streaming)

Label
Insider threats and attacks : detection and prevention
Title
Insider threats and attacks
Title remainder
detection and prevention
Contributor
Subject
Language
eng
Summary
Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled employees or malicious business partners, they can be very costly and difficult for the organization to recover from. In this report Jason Mical, Director of Network Forensics at AccessData, offers advice and best practices to help organizations reduce the risk of a successful insider attack on enterprise data, systems and networks. Track: Technical briefings in-depth information on new technologies, techniques and solution providers. Learning objectives: Understand the nature of an insider-attack and the profile of a typical attacker. Discuss insider-attack methods and the systems and applications that may be particularly vulnerable to malicious attacks. Explain ways organizations can reduce the risk of an insider attack
Cataloging source
UtOrBLW
Characteristic
videorecording
Date time place
Originally produced by SmartPros in 2012
http://library.link/vocab/relatedWorkOrContributorName
Kanopy (Firm)
Runtime
20
http://library.link/vocab/subjectName
  • Cyberterrorism
  • Computer science
Technique
live action
Label
Insider threats and attacks : detection and prevention, (online streaming)
Link
Instantiates
Publication
Note
Title from title frames
Antecedent source
unknown
Carrier category
online resource
Carrier MARC source
rdacarrier
Configuration of playback channels
unknown
Content category
two-dimensional moving image
Content type MARC source
rdacontent
Control code
kan1089919
Dimensions
unknown
Extent
1 online resource (1 video file, approximately 21 min.)
File format
unknown
Form of item
online
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Medium for sound
other
Other physical details
digital, .flv file, sound
Publisher number
1089919
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
sound
Sound on medium or separate
sound on medium
Specific material designation
  • other
  • remote
System control number
(OCoLC)897770069
System details
Mode of access: World Wide Web
Video recording format
other
Label
Insider threats and attacks : detection and prevention, (online streaming)
Link
Publication
Note
Title from title frames
Antecedent source
unknown
Carrier category
online resource
Carrier MARC source
rdacarrier
Configuration of playback channels
unknown
Content category
two-dimensional moving image
Content type MARC source
rdacontent
Control code
kan1089919
Dimensions
unknown
Extent
1 online resource (1 video file, approximately 21 min.)
File format
unknown
Form of item
online
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Medium for sound
other
Other physical details
digital, .flv file, sound
Publisher number
1089919
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
sound
Sound on medium or separate
sound on medium
Specific material designation
  • other
  • remote
System control number
(OCoLC)897770069
System details
Mode of access: World Wide Web
Video recording format
other

Library Locations

    • Lionel Bowen Library and Community CentreBorrow it
      669-673 Anzac Parade, Marouba, NSW, 2035, AU
      -33.938111 151.237977
Processing Feedback ...