O'Reilly logo

Effective Incident Response Team, The by Brian Moeller, Julie Lucas

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Sound Security Practices

Lack of training is not the only source of threats emanating from the users of a system. The estimated share of system penetrations stemming from fully authorized users who abuse their access privileges to perform unauthorized functions has varied over the past decade from 50 percent to 80 percent. Although these estimates fall within a considerably wide range, the bottom line is that the “insider threat” should not be ignored.

The following areas are points where systems may be vulnerable to attacks and should receive extra attention:

  • Controls over data handling. Controls need to be implemented for every form of data, not just the data that reside on the computer systems. These controls need to be documented and enforced, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required