Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

David McIntire
December 2014 - Technical Note Pattern-Based Design of Insider Threat Programs

Topics: Insider Threat

Authors: Andrew P. Moore, Matthew L. Collins, Dave Mundie, Robin Ruefle, David McIntire

In this report, the authors describe a pattern-based approach to designing insider threat programs that could provide a better defense against insider threats.

August 2014 - Technical Report A Systematic Approach for Assessing Workforce Readiness

Topics: Incident Management

Authors: Christopher J. Alberts, David McIntire

In this report, the authors present the Competency Lifecycle Roadmap and the readiness test development method, both used to maintain workforce readiness.

October 2013 - Conference Paper Four Insider IT Sabotage Mitigation Patterns and an Initial Effectiveness Analysis

Topics: Insider Threat

Authors: Lori Flynn, Jason W. Clark, Andrew P. Moore, Matthew L. Collins, Eleni Tsamitis, Dave Mundie, David McIntire

In this paper, the authors describe four patterns of insider IT sabotage mitigation and initial results from 46 relevant cases for pattern effectiveness.

March 2013 - Technical Note Justification of a Pattern for Detecting Intellectual Property Theft by Departing Insiders

Topics: Insider Threat

Authors: Andrew P. Moore, David McIntire, Dave Mundie, David Zubrow

In this report, the authors justify applying the pattern “Increased Review for Intellectual Property (IP) Theft by Departing Insiders.”

February 2013 - Technical Note The MAL: A Malware Analysis Lexicon

Topics: Incident Management

Authors: Dave Mundie, David McIntire

In this report, the authors present results of the Malware Analysis Lexicon (MAL) initiative, which developed the first common vocabulary for malware analysis.

December 2012 - White Paper Chronological Examination of Insider Threat Sabotage: Preliminary Observations

Topics: Insider Threat

Authors: William R. Claycomb, Carly L. Huth, Lori Flynn, David McIntire, Todd Lewellen

In this paper, the authors examine 15 cases of insider threat sabotage of IT systems to identify points in the attack time-line.

July 2012 - Special Report Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector

Topics: Insider Threat

Authors: Adam Cummings, Todd Lewellen, David McIntire, Andrew P. Moore, Randall F. Trzeciak

In this report, the authors describe insights and risk indicators of malicious insider activity in the banking and finance sector.