Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

George Silowash
December 2016 - Technical Note Low Cost Technical Solutions to Jump Start an Insider Threat Program

Topics: Insider Threat

Authors: George Silowash, Derrick Spooner, Daniel L. Costa, Michael J. Albrethsen

This technical note explores free and low cost technical solutions to help organizations prevent, detect, and respond to malicious insiders.

May 2016 - Technical Report An Insider Threat Indicator Ontology

Topics: Insider Threat

Authors: Daniel L. Costa, Michael J. Albrethsen, Matthew L. Collins, Samuel J. Perl, George Silowash, Derrick Spooner

This report presents an ontology for insider threat indicators, describes how the ontology was developed, and outlines the process by which it was validated.

November 2014 - Conference Paper An Ontology for Insider Threat Indicators

Topics: Insider Threat

Authors: Daniel L. Costa, Matthew L. Collins, Samuel J. Perl, Michael J. Albrethsen, George Silowash, Derrick Spooner

In this paper, the authors describe their ongoing development of an insider threat indicator ontology.

April 2014 - Technical Report International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany

Topics: Insider Threat

Authors: Lori Flynn, Carly L. Huth, Palma Buttles-Valdez, Michael C. Theis, George Silowash, Tracy Cassidy, Travis Wright (Carnegie Mellon University, Master of Science in Information Security Policy and Management Program), Randall F. Trzeciak

This report analyzes insider threat mitigation in India and Germany, using the new framework for international cybersecurity analysis described in the paper titled “Best Practices Against Insider Threats in All Nations.”

November 2013 - Webinar Best Practices and Controls for Mitigating Insider Threats

Topics: Insider Threat

Authors: George Silowash, Alex Nicoll

In this 2013 webinar, Alex Nicoll and George Silowash discuss how the CERT division develops, inspects, and transitions insider threat controls to the public.

October 2013 - Technical Note Insider Threat Control: Using Plagiarism Detection Algorithms to Prevent Data Exfiltration in Near Real Time

Topics: Insider Threat

Authors: Todd Lewellen, George Silowash, Daniel L. Costa

In this report, the authors describe how an insider threat control can monitor an organization's web request traffic for text-based data exfiltration.

July 2013 - Technical Note Insider Threat Attributes and Mitigation Strategies

Topics: Insider Threat

Authors: George Silowash

In this report, George Silowash maps common attributes of insider threat cases to characteristics important for detecting, preventing, or mitigating the threat.

March 2013 - Technical Note Detecting and Preventing Data Exfiltration Through Encrypted Web Sessions via Traffic Inspection

Topics: Digital Intelligence and Investigation, Incident Management, Insider Threat

Authors: George Silowash, Todd Lewellen, Joshua W. Burns, Daniel L. Costa

In this report, the authors present methods for detecting and preventing data exfiltration using a Linux-based proxy server in a Microsoft Windows environment.

February 2013 - Podcast Mitigating Insider Threat - New and Improved Practices Fourth Edition

Topics: Insider Threat

Authors: George Silowash, Lori Flynn, Julia H. Allen

In this podcast, participants explain how 371 cases of insider attacks led to 4 new and 15 updated best practices for mitigating insider threats.

January 2013 - Technical Note Insider Threat Control: Using Universal Serial Bus (USB) Device Auditing to Detect Possible Data Exfiltration by Malicious Insiders

Topics: Insider Threat

Authors: George Silowash, Todd Lewellen

In this report, the authors present methods for auditing USB device use in a Microsoft Windows environment.

January 2013 - Technical Note Insider Threat Control: Understanding Data Loss Prevention (DLP) and Detection by Correlating Events from Multiple Sources

Topics: Insider Threat

Authors: George Silowash, Christopher King

In this report, the authors present methods for controlling removable media devices in a MS Windows environment.

December 2012 - Technical Report Common Sense Guide to Mitigating Insider Threats, Fourth Edition

Topics: Insider Threat

Authors: George Silowash, Dawn Cappelli, Andrew P. Moore, Randall F. Trzeciak, Timothy J. Shimeall, Lori Flynn

In this report, the authors define insider threats and outline current insider threat patterns and trends.