The Threat of the Insider Threat

Author: Matt Bishop
Given at: UCDHS Health Informatics Seminar
Date: October 12, 2011
First slide (slide 1)
Last slide (slide 53)

Slide 1: The Threat of the Insider Threat
Slide 2: Disclosure
Slide 3: Others Who Contributed
Slide 4: Outline
Slide 5: Overview
Slide 6: Legendary Example
Slide 7: Real-Life Examples
Slide 8: Defining the Insider
Slide 9: More Definitions
Slide 10: Still More Definitions
Slide 11: And Still More Definitions
Slide 12: And a Final Definition
Slide 13: Perimeters
Slide 14: Problems
Slide 15: Supply Chain Problem
Slide 16: Not Just Computer Scientists
Slide 17: Common Notions in Definitions
Slide 18: What Controls Access?
Slide 19: Our Approach
Slide 20: Issues
Slide 21: Example
Slide 22: Unifying Policy Hierarchy
Slide 23: The Threats
Slide 24: Examples Between Levels
Slide 25: Detailed Example
Slide 26: Assumption for Talk
Slide 27: Key Point
Slide 28: Finding the Attackers
Slide 29: ABGAC
Slide 30: Example
Slide 31: Applying to Insiders
Slide 32: What To Worry About
Slide 33: Components
Slide 34: Components
Slide 35:
Slide 36: Example: E-Voting
Slide 37: Developing Groups
Slide 38: Observations
Slide 39: Psychological and Social
Slide 40: Put These Together
Slide 41: Example: E-Recordation
Slide 42: Resources
Slide 43: Resource Groups
Slide 44: User Groups
Slide 45: Risk Analysis
Slide 46: Some Users
Slide 47: Some More Users
Slide 48: Values of Resources
Slide 49: Combining These
Slide 50: Future Work
Slide 51: Conclusion
Slide 52:
Slide 53: Author Information

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh
Last updated on Friday, October 18, 2024 10:58:20 AM PDT