Chapter 35: Insider Threats
Review Questions/Exercises
True/False
1. False
2. True
3. True
4. False
5. True
Multiple Choice
1. E
2. A
3. B
4. D
5. C
Exercise
Solution
The following is a partial exercise solution. The students should be able to expand on the following:
These following insider threat standards shall include, but are not limited to, the following:
• Monitoring of user activity on the organization's networks. This refers to
• audit data collection strategies for insider threat detection, leveraging hardware and/or software with triggers deployed on private networks to detect, monitor, and analyze anomalous user behavior for indicators of misuse.
• Continued evaluation of personnel security information whereby information is gathered from, including ...
Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.