Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Technical Note

Insider Threat Attributes and Mitigation Strategies

  • July 2013
  • By George Silowash
  • In this report, George Silowash maps common attributes of insider threat cases to characteristics important for detecting, preventing, or mitigating the threat.
  • Insider Threat
  • Publisher: Software Engineering Institute
    CMU/SEI Report Number: CMU/SEI-2013-TN-018
  • Abstract

    Malicious insiders pose a threat to the confidentiality, integrity, and availability of an organization's information. Many organizations look for hardware and software solutions that address insider threats but are unsure of what characteristics to look for in a product. This technical note presents seven common attributes of insider threat cases, excluding espionage, drawn from the CERT® Division's database. The note maps the seven attributes to characteristics insider threat products should possess in order to detect, prevent, or mitigate the threat. None of these attributes alone can identify a malicious insider. Rather, each attribute is one of many data points that an organization should consider when implementing an insider threat program. 

  • Download

Cite This Report

SEI

Silowash, George. Insider Threat Attributes and Mitigation Strategies. CMU/SEI-2013-TN-018. Software Engineering Institute, Carnegie Mellon University. 2013. http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=57586

IEEE

Silowash. George, "Insider Threat Attributes and Mitigation Strategies," Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania, Technical Note CMU/SEI-2013-TN-018, 2013. http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=57586

APA

Silowash, George. (2013). Insider Threat Attributes and Mitigation Strategies (CMU/SEI-2013-TN-018). Retrieved December 03, 2016, from the Software Engineering Institute, Carnegie Mellon University website: http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=57586

CHI

George Silowash. Insider Threat Attributes and Mitigation Strategies (CMU/SEI-2013-TN-018). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2013. http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=57586

MLA

Silowash, George. 2013. Insider Threat Attributes and Mitigation Strategies (Technical Report CMU/SEI-2013-TN-018). Pittsburgh: Software Engineering Institute, Carnegie Mellon University. http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=57586

BibTex

@techreport{SilowashInsiderThreat2013,
title={Insider Threat Attributes and Mitigation Strategies},
author={George Silowash},
year={2013},
number={CMU/SEI-2013-TN-018},
institution={Software Engineering Institute, Carnegie Mellon University},
address={Pittsburgh, PA},
url={http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=57586} }