Back to Results
First PageMeta Content
Hacking / Software testing / Threat / Abuse / Vulnerability / Attack tree / Insider / Motivation / Computer network security / Cyberwarfare / Computer security


2014 IEEE Security and Privacy Workshops Understanding Insider Threat: A Framework for Characterising Attacks Jason R.C. Nurse† , Oliver Buckley† , Philip A. Legg† , Michael Goldsmith† , Sadie Creese† , Gordon
Add to Reading List

Document Date: 2014-04-30 03:10:27


Open Document

File Size: 1,27 MB

Share Result on Facebook

Company

Attack Step / Section I / Fannie Mae / /

Country

United Kingdom / /

Currency

USD / GBP / /

/

Event

Person Communication and Meetings / Product Issues / /

Facility

University of Oxford / University of Leicester / /

IndustryTerm

work devices / bank / enterprise information infrastructure / portable media / block portable-media / social networks / security tools / software developer / technology usage policies / unpatched Web servers / /

MarketIndex

set 80 / /

OperatingSystem

Microsoft Windows / /

Organization

University of Leicester / Cyber Security Centre / CMUCERT / UK’s Centre for the Protection of National Infrastructure / Department of Computer Science / Ministry of Justice / Carnegie Mellon University / UK Government / Department of Media and Communications / Federal Bureau of Investigation / University of Oxford / /

Person

Monica Whitty / Catalyst / Edward Snowden / E. Assets / Xiang Dong Yu / Michael Woodford / Jason R.C. Nurse / Michael Goldsmith / Philip A. Legg / Oliver Buckley / Sadie Creese / Gordon R.T. Wright / /

/

Position

C. The actor / contractor / Information Commissioner / system administrator / Actor / manager / designer / systems administrator / administrator / clerk / researcher / bank teller / consultant / analyst / software developer / Booking clerk / Behaviour elements Actor / /

Product

Attack Steps / building security / /

Technology

encryption / /

SocialTag