Documents in the NTIS Technical Reports collection are the results of federally funded research. They are directly submitted to or collected by NTIS from Federal agencies for permanent accessibility to industry, academia and the public.  Before purchasing from NTIS, you may want to check for free access from (1) the issuing organization's website; (2) the U.S. Government Printing Office's Federal Digital System website; (3) the federal government Internet portal; or (4) a web search conducted using a commercial search engine such as
Accession Number ADA592535
Title Best Practices and Controls for Mitigating Insider Threats.
Publication Date Aug 2013
Media Count 54p
Personal Author A. Nicoll G. Silowash
Abstract No abstract available.
Keywords Algorithms
Apache lucene
Base lines
Blocking documents
Briefing charts
Clamav detection
Cloud computing
Computer network security
Cosine similarity algorithms
Data transmission security
Hacking(Computer security)
Insider threats
Mitm proxies
Mitm(Man in the middle)
Plagiarism detection
Proxy servers
Risk analysis
Security agreements
Social media
Threat evaluation
Unauthorized data exfiltration

Source Agency Non Paid ADAS
NTIS Subject Category 62D - Information Processing Standards
62 - Computers, Control & Information Theory
74G - Military Operations, Strategy, & Tactics
Corporate Author Carnegie-Mellon Univ., Pittsburgh, PA. Software Engineering Inst.
Document Type Technical report
Title Note Briefing charts.
NTIS Issue Number 1412
Contract Number FA8721-05-C-0003

Science and Technology Highlights

See a sampling of the latest scientific, technical and engineering information from NTIS in the NTIS Technical Reports Newsletter

Acrobat Reader Mobile    Acrobat Reader