Artwork

Content provided by UNC Chapel Hill's Information Security Office & UNC Fayetteville State's Information Security Office, UNC Chapel Hill's, and UNC Fayetteville State's Information Security Offices. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by UNC Chapel Hill's Information Security Office & UNC Fayetteville State's Information Security Office, UNC Chapel Hill's, and UNC Fayetteville State's Information Security Offices or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Data at Rest 01x03: Threat Detection

54:40
 
Share
 

Manage episode 407384562 series 3561094
Content provided by UNC Chapel Hill's Information Security Office & UNC Fayetteville State's Information Security Office, UNC Chapel Hill's, and UNC Fayetteville State's Information Security Offices. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by UNC Chapel Hill's Information Security Office & UNC Fayetteville State's Information Security Office, UNC Chapel Hill's, and UNC Fayetteville State's Information Security Offices or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Data at Rest - Episode 01x03: Threat Detection

What is a threat? What is an exploit? Plus: the history and evolution of how we think about "insider" threats versus "outsider" threats.

The Orange Book (PDF)

James Anderson (obituary at IEEE)

Dorothy Denning (Wikipedia)

Peter Neumann (Wikipedia)

Clipper Chip (Wikipedia)

  continue reading

45 episodes

Artwork
iconShare
 
Manage episode 407384562 series 3561094
Content provided by UNC Chapel Hill's Information Security Office & UNC Fayetteville State's Information Security Office, UNC Chapel Hill's, and UNC Fayetteville State's Information Security Offices. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by UNC Chapel Hill's Information Security Office & UNC Fayetteville State's Information Security Office, UNC Chapel Hill's, and UNC Fayetteville State's Information Security Offices or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Data at Rest - Episode 01x03: Threat Detection

What is a threat? What is an exploit? Plus: the history and evolution of how we think about "insider" threats versus "outsider" threats.

The Orange Book (PDF)

James Anderson (obituary at IEEE)

Dorothy Denning (Wikipedia)

Peter Neumann (Wikipedia)

Clipper Chip (Wikipedia)

  continue reading

45 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide