SecDB_Nikhil Kapoor_ResearchPaper_ppt

SecDB_Nikhil Kapoor_ResearchPaper_ppt - CSCE 824 RESEARCH...

Info iconThis preview shows pages 1–11. Sign up to view the full content.

View Full Document Right Arrow Icon
Research Paper Overview INSIDER THREAT! Presented by: Nikhil Kapoor Guided by: Dr. Csilla Farkas CSCE 824 – RESEARCH PROJECT – FALL 2011
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Paper under Review! “The Insider Threat Security Architecture: A Framework for an Integrated, Inseparable, and uninterrupted Self-Protection Mechanism Ghassan "Gus" Jabbour, Daniel A. Menascé 2009 International Conference on Computational Science and Engineering;
Background image of page 2
Keywords… “The Insider Threat Security Architecture: A Framework for an Integrated, Inseparable, and uninterrupted Self-Protection Mechanism Architecture Security Policy Autonomic Systems Integrated Inseparable
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Protection for networks, applications, databases, storage media, and communication channels >>> all at the same time! Organizations still lacking in instituting a Comprehensive Security Framework .
Background image of page 4
New trends! Global, Interconnected, Internet-based deployment of applications and exchange of business transactions. Previously >> amateurs and hobby hackers
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
To detect external threats >> Software tools and technologies, Password enforcement, Firewalls, Encryption, Two-factor Authentication, Access-Control System Audits, Patch Management, Network Traffic Monitoring, Penetration Testing.
Background image of page 6
Brief Layout Comparison b/w Traditional vs ITSA enabled protection Intricacies of ITSA Framework Future Directions for Self-Protection Mechanisms
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Comparison between Traditional Approach to System Protection as against the ITSA Framework
Background image of page 8
Traditional approach to system protection: NO protection against insiders!
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
protection: NO protection against insiders! DBA has unfettered access to the system Can make any kind of changes without any restrictions or limitations. Can compromise system in a subtle way or an obvious way. Ex. of former case would be changing
Background image of page 10
Image of page 11
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/13/2011 for the course CSCE 824 taught by Professor Staff during the Fall '11 term at South Carolina.

Page1 / 37

SecDB_Nikhil Kapoor_ResearchPaper_ppt - CSCE 824 RESEARCH...

This preview shows document pages 1 - 11. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online