Works Cited

Chapter 1

“BGC Partners Using BeyondTrust Privilege Manager to Secure 6,000 Desktops.” 2010.

Vijayan, J. “Three Fired for Accessing Records of Tucson Shooting Victims,” ComputerWorld (2011).

Hill, K. “Hacker Fail: Two College Kids Discover Police Are Not as ‘Dumb’ As They Thought.” 2010. Forbes.com.

Carpenter, P. “Net-it-Out” Presentation: Gartner Information Security Summit. Gartner, Inc., 2010. n. pag. Print.

National Security Council, “The Comprehensive National Cybersecurity Initiative.” 2011.

Witosky, T. “Iowa Hospital Investigating Possible Breach of Players' Records,” USA Today (2011).

Chapter 2

Offensive Security, Adobe Shockwave Player rcsL Chunk Memory Corruption 0day. 2010.

Arkansas State University. “Arkansas State University, Privacy Breach Management.” 2010.

“HFC Bank in Mass E-mail Blunder.” BBC News, 2004.

“Computer Crime and Security Survey.” 2011. Print.

“CyberSpace Policy Review,” 2008. Print.

DATALOSS DB, Data Loss DB. 2011.

“Yet Another Security Firm Breached: Employee Email, User Accounts Leaked.” Dark Reading (2011).

Diodatti, M. “Excessive User Privilege.” Gartner, Inc., 2010. N. Pag. Print.

Al Gillen, Frederick W. Broussard, Seana Dowling. “WHITE P APER Optimizing Infrastructure: The Relationship Between IT Labor Costs and Best Practices for Identity and Access Management With Active Director Y.” 2006. N. Pag. Print.

Mah, P. “Disgruntled Ex-Gucci Network Engineer Allegedly Goes on IT Rampage,” IT Business Edge (2011).

“Florida Hospital Admits to Data Breach Affecting 1500 Patients.” 2010. Infosecurity.com.

“Massive Data Breach at University of Hawaii Involves 40,000 Former Students,” 2010.

Bradley, Tony. “McDonald's Customer Data Compromised Through Contractor,” PC World (2010).

Ponemon Institute,. “2009 Annual Study: Cost of a Data Breach Report.” Methodology. 2010. N. Pag. Print.

“Security Summit 2010.” 2010. Print.

US Secret Service. “2010 CyberSecurity Watch Survey—Survey Results Conducted by CSO Magazine in Cooperation with the U.S. Secret Service, Software Engineering Institute CERT Program at Carnegie Mellon University and Deloitte, August 2008.” 2010. n. pag. Print.

Hunt, P. “Vodafone Terminates Staff over Data Breach” 2011. WCJB.co.uk.

A. Spencer, A. Efrati. “Google Takes Heat Over App Security”, Wall Street Journal Online (2011).

S. Craig, K. Scannel. “Goldman Settles Its Battle With SEC,” WallStreet Journal Online (2010).

Kingsley-Hughes, A. “Stolen Apps That Root Android, Steal Data and Open Backdoors Available for Download from Google Market,” ZDNet (2011).

Chapter 3

BeyondTrust. “MD Anderson Selects PowerBroker for Servers.” 2010.

Hickey, A. “Mobile Device Security Threats Attract Cybercriminals.” CRN (2011).

Gartner, Inc. “Gartner Says Media Tablets Help Drive Worldwide IT Spending Up 5.6 Percent in 2011.” Gartner, 2011.

Hudson, S. “Security Products: Vendor Profile.” IDC (2010). Print.

“Mac OS ‘Crime Kit’ Lets Users Make Own Apple Malware.” GMA News, 2011.

Ponemon Institute. “Access Governance Trends Survey Sponsored by Aveksa.” 2010. Print.

Martin, M. “Wikileaks Wrangling May Be Escalating Into Cyberwar.” Tech-NewsWorld (2010).

“The IT Auditor.” The IT Auditor (2011).

“Underground Economies.” 2011.

Baker, W. Et Al. “2010 Data Breach Investigations Report—A Study Conducted by the Verizon RISK Team in Cooperation with the United States Secret Service.” Verizon Risk Team. 2010. N. Pag. Print.

Hunt, P. “Vodafone Terminates Staff over Data Breach.” 2011. WCJB.co.uk.

Z. Seward, A. Sun. “Wall Street Journal Online, The Top 50 Gawker Media Passwords.” Wall Street Journal Online (2010).

Zierick, Jim. “How to Prevent a WikiLeaks Mega Leak from Your Organization.” eWeek (2011).

Chapter 4

BeyondTrust. “BeyondTrust 2010 Microsoft Vulnerability Report.” 2011. Print.

“Quintiles Achieves Compliance, Improves Productivity.” Case Study, 2010.

“The University of Winchester Selects PowerBroker® to Secure Their Windows Desktops.” Case, 2011.

D. Melber. “Achieving Windows Desktop ‘Least Privilege ’ in the Federal Market., BeyondTrust 2010: 1-10. Print.

Mar-Elia, D. “From Least Privilege to Best Privilege on Your Windows® Desktops.” BeyondTrust 2010. Print.

Cosgrove, T. “The Cost of Removing Administrative Rights for the Wrong Users.” Gartner, Inc. 2011. n. pag. Print.

Chapter 5

BeyondTrust. “Cetrel S.A. Replaces Sudo with BeyondTrust PowerBroker.” Case Study, 2010.

(Experts Forecast Top Seven Trends in Healthcare Information Privacy for 2011.” 2011. PHIPrivacy.net.

Joab, Jackson. “Mozilla Site Exposed Encrypted Passwords.” ComputerWorld (2010).

Martin, Paul K. “Inadequate Security Practices Expose Key Nasa Network to Cyber Attack.” 2011.

National Cyber Security Devision, DHS. “National Vulnerability Database.” 2010.

Ponemon Institute. “Security of Cloud Computing Providers Study.” 2011. Print.

Martin, M. “Wikileaks Wrangling May Be Escalating Into Cyberwar.” Tech-NewsWorld (2010).

Walsh, Sue. “Info Stolen From Millions of Phishing Victims For Sale.” All Spammed Up (2009).

Chapter 6

Forrester, Inc. “Market Overview: Privileged Identity Management.” 2010. Print.

Perkins, E. “A Process View of Identity and Access Management Is Essential.” Gartner, Inc., 2011. Print.

MacDonald, N. “Addressing the Most Common Security Risks in Data Center Virtualization Projects.” Gartner, Inc., 2009. n. pag. Print.

Bittman, T. “The Drivers and Challenges of Private Cloud Computing.” Gartner, Inc., March 3, 2011. n. pag. Print.

Lemos, Robert. “Pentagon's Insider Threat Push Offers Lessons For Enterprises.” Dark Reading (2010).

Lynch, David. “Virtual Sprawl Is Not the Real Problem.” Virtualization Journal (2010).

Mitchell, Robert. “The Scary Side of Virtualization.” ComputerWorld (2010).

Chapter 7

Cosgrove, T. “The Cost of Removing Administrative Rights for the Wrong Users.” Gartner, Inc., 2011. n. pag. Print.

Gartner, Inc., B. Blakely, 2011.

Bittman, T. “The Drivers and Challenges of Private Cloud Computing.” Gartner, Inc., March 2011.

Jansen, Wayne, and Timothy Grance. “Guidelines on Security and Privacy in Public Cloud Computing.” 2011. Print.

Ponemon Institute. “Security of Cloud Computing Providers Study.” 2011. Print.

Storts, John. “Keep Security and Privacy Considerations Top-of-Mind When Weighing Cloud Options.” IT Business Edge (2011).

Cloud Computing. “Top Threats to Cloud Computing V1.0.” 2010. Print.

Chapter 8

Oltsik, J. “Database Security and Compliance Risks.” ESG (2009).

Wilson, Thomas J. “Data in the Dark.” 2010. Print.

Z. Seward, A. Sun. “Wall Street Journal Online, The Top 50 Gawker Media Passwords.” Wall Street Journal Online (2010).

Chapter 9

BeyondTrust. “DCI Selects PowerBroker Safe to Meet Regulatory Compliance.” 1963. Print.

“MD Anderson Selects PowerBroker for Servers.” 2008. Print.

“CSI 2010: Compliance Does Not Equal Security.” 2010. Infosecurity.com.

I. Glazier, B. Blakley, M. Diodati, K. Kampman, L. Rowland. “Market Profile: Identity Management 2010.” Gartner, Inc., 2010. n. pag. Print.

Protiviti. “2011 SOX Compliance Survey.” 2011.

“Regulations.gov.” Regulations.gov.

“Security Standards Council, Media Contacts.” 2011. Print.

Department of Health and Human Services. “Department of Health and Human Health Insurance Reform: Security.” 2003. Print.

Wilson, Thomas J. “Data in the Dark.” 2010. Print.

Chapter 10

BeyondTrust. “BeyondTrust Survey at VMWorld Shows What It Takes to Get Attendees in a Tutu.” BeyondTrust Blog (2010).

“Care New England Selects PowerBroker ® to Secure Their Desktop Infrastructure.” 2010.

“RSA Survey: No Trust for Cloud Vendors, Wikileaks.” BeyondTrust Blog (2011).

Cosgrove, T. “The Cost of Removing Administrative Rights for the Wrong Users.” Gartner, Inc., 2011. n. pag. Print.

Keizer, Gregg. “Microsoft Accuses Former Manager of Stealing 600MB of Confidential Docs.” ComputerWorld (2011).

McMillan, Robert. “Microsoft: One in 14 Downloads Is Malicious.” PC World and Magazine (2011).

Ponemon Institute. “Security of Cloud Computing Providers Study.” 2011. Print.

S. Craig, K. Scannel. “Goldman Settles Its Battle With SEC.” Wall Street Journal Online (2010).

“What Jerome Kerviel's Sentence Could Teach Us in America.” 2010. Forbes.com.

Chapter 11

BeyondTrust. “The University of Winchester Selects PowerBroker® to Secure Their Windows Desktops.”2011.

Cser, A. “PIM Market Overview.” Forrester, Inc., 2010. n. pag. Print.

Ponemon Institute. “Security of Cloud Computing Providers Study.” 2011. Print.

Sumner, Stuart. “ICO Investigates NHS Loss of 8.63m Patient Records.” 2011. Computing.co.uk.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.141.199.243