From CERT - Great Datasets of sample Insider Threat activity. Comes with an answer file and CSV data sets of generated Insider Threat information. Great to use in your organization to train security personnel on identifying Insider Threat data within logs.
https://www.cert.org/insider-threat/tools/
Labels
- 3-D technology
- Advanced Hacking Techniques
- Advanced Security Techniques
- Advanced Security Threats
- AET
- Anonymity
- APT
- Automotive Cyber Security
- Banking Security
- Big Data
- botnets
- Chinese Hacking
- Cyber Crime
- Cyber Espionage
- Cyber Kill Chain
- Cyber Terrorism
- Cyber Warfare
- Dark Web
- DDOS
- Deep Web
- Drones
- Email Privacy
- Encryption
- Extremism
- Google Glass
- Guidance
- Home Security
- Incident Response
- Industrial Security Concerns
- Insider Threat
- International Affairs
- ios
- IoT
- Law Enforcement
- Medical Technology
- Mobile Security
- NATO
- OSINT
- Pentesting
- Physical Security
- Privacy
- Ransomware
- Russian Hacking
- Security Reports
- Social Attack Vectors
- Social Media Propoganda
- Spyware
- Supply Chain Threats
- Terrorism
- Tools
- Trusted Insider
- Vulnerabilities
- Wireless
- Zero Day
Saturday, November 1, 2014
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment