search menu icon-carat-right cmu-wordmark

Four Insider IT Sabotage Mitigation Patterns and an Initial Effectiveness Analysis

Conference Paper
In this paper, the authors describe four patterns of insider IT sabotage mitigation and initial results from 46 relevant cases for pattern effectiveness.
Publisher

The Hillside Group

Abstract

This paper describes four patterns of insider IT sabotage mitigation and initial results from an investigation of 46 relevant cases for pattern effectiveness. The four IT sabotage mitigation patterns are represented in the case data, suggesting that some cases might have been prevented, detected earlier, or responded to more effectively if the suggested solutions were implemented. To our knowledge, there has been no previous successful demonstration or attempted use of the patterns described in this paper. The initial effectiveness analysis shows supporting but inconclusive results due to insufficient (case and baseline) data.

Download this conference paper>