Skip to main content

Currently Skimming:

4. Technology, Present and Future
Pages 7-10

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 7...
... One participant characterized the dilemma in both domains by paraphrasing directives from senior management and government as, "Collaborate with everybody but build systems that are resistant to attack." Legal Issues There are many legal aspects to the problem of the insider threat. First, the usual privacy and workplace surveillance issues need to be addressed when determining how, within an organization, to implement tools to decrease the possibility of insider malfeasance.
From page 8...
... · New models of inside threat versus outside threat · Authentication of roles, rights, privileges 4 Suggested reasons for the lack of success resulting from the use of current tools include difficulty of implementation, challenges to administration and maintenance, and poor management. 5 It was noted that credit card companies collectively lose on the order of $1 billion per year and are willing to accept this amount of loss.
From page 9...
... applications · Continuous biometrics Software for monitoring the system administrator Component verification Fingerprinting of (locuments Tagging technologies A Rand workshop in August of 20006 on the insider threat generated the following as the top research areas to which attention should be devoted in the next two to five years: Survivable architecture frameworks Differential access controls Provenance Mobile code (protect code from attack as well as systems from malicious code) ., It was emphasized repeatedly that the insider threat and cyber-security problem is not merely a technological one.
From page 10...
... CSTB has a history of examining governmental requirements versus commercial requirements and explicating the similarities and differences thereof, making a project of this scope feasible. NEXT STEPS: The participants in this meeting encouraged CSTB to develop a proposal for a study to examine high-grade threats (inclu(ling insider threats)


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.