Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Dawn Cappelli
December 2013 - White Paper Spotlight On: Programmers as Malicious Insiders–Updated and Revised

Topics: Insider Threat

Authors: Matthew L. Collins, Dawn Cappelli, Thomas C. Caron (John Heinz III College, School of Information Systems Management, Carnegie Mellon University), Randall F. Trzeciak, Andrew P. Moore

In this paper, the authors describe the who, what, when, where, and how of attacks by insiders using programming techniques and includes case examples.

May 2013 - Technical Note Spotlight On: Insider Theft of Intellectual Property Inside the United States Involving Foreign Governments or Organizations (2013)

Topics: Insider Threat

Authors: Matthew L. Collins, Derrick Spooner, Dawn Cappelli, Andrew P. Moore, Randall F. Trzeciak

In this report, the authors provide a snapshot of individuals involved in insider threat cases and recommends how to mitigate the risk of similar incidents.

December 2012 - Technical Report Common Sense Guide to Mitigating Insider Threats, 4th Edition

Topics: Insider Threat

Authors: George Silowash, Dawn Cappelli, Andrew P. Moore, Randall F. Trzeciak, Timothy J. Shimeall, Lori Flynn

In this report, the authors define insider threats and outline current insider threat patterns and trends.

October 2012 - White Paper Spotlight On: Insider Threat from Trusted Business Partners Version 2: Updated and Revised

Topics: Insider Threat

Authors: Todd Lewellen, Andrew P. Moore, Dawn Cappelli, Randall F. Trzeciak, Derrick Spooner, Robert Weiland (Carnegie Mellon University)

In this article, the authors focus on cases in which the malicious insider was employed by a trusted business partner of the victim organization.

February 2012 - Presentation The CERT Top 10 List for Winning the Battle Against Insider Threats

Topics: Insider Threat

Authors: Dawn Cappelli

In this presentation, Dawn Cappelli provides real-case examples to reinforce best practices in mitigating insider threat.

January 2012 - Book The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)

Topics: Insider Threat

Authors: Dawn M. Cappelli, Andrew P. Moore, Randall F. Trzeciak

In this book, the authors present best practices for managing the security and survivability of people, information, technology, and facilities.

June 2011 - Presentation Insider Threats: Actual Attacks by Current and Former and Software Engineers

Topics: Insider Threat

Authors: Dawn Cappelli

In this presentation, Dawn Cappelli describes the CERT Insider Threat Crime Profiles and strategies to mitigating insider threat.

June 2011 - Technical Note A Preliminary Model of Insider Theft of Intellectual Property

Topics: Insider Threat

Authors: Andrew P. Moore, Dawn Cappelli, Thomas C. Caron (John Heinz III College, School of Information Systems Management, Carnegie Mellon University), Eric D. Shaw, Derrick Spooner, Randall F. Trzeciak

In this report, the authors describe general observations about and a preliminary system dynamics model of insider crime based on our empirical data.

February 2011 - Presentation Combat IT Sabotage: Technical Solutions From The CERT Insider Threat Lab

Topics: Insider Threat

Authors: Dawn Cappelli, Joji Montelibano

In this presentation, the authors discuss crime profiles and countermeasures related to insider IT sabotage.

October 2010 - Presentation The Key to Successful Monitoring for Detection of Insider Attacks

Topics: Insider Threat

Authors: Dawn Cappelli, Randall F. Trzeciak, Robert Floodeen

In this presentation, Software Engineering Institute researchers show how to detect insider threats successfully by monitoring and auditing network activity.

February 2010 - White Paper Spotlight On: Insider Threat from Trusted Business Partners

Topics: Insider Threat

Authors: Robert Weiland (Carnegie Mellon University), Andrew P. Moore, Dawn Cappelli, Randall F. Trzeciak, Derrick Spooner

In this report, the authors focus on cases in which the insider was employed by a trusted business partner of the victim organization.

August 2009 - Podcast Mitigating Insider Threat: New and Improved Practices

Topics: Insider Threat

Authors: Dawn Cappelli, Randall F. Trzeciak, Andrew P. Moore, Julia H. Allen

Two hundred and eighty-two cases of actual insider attacks suggest 16 best practices for preventing and detecting insider threat.

July 2009 - White Paper Insider Theft of Intellectual Property for Business Advantage: A Preliminary Model

Topics: Insider Threat

Authors: Andrew P. Moore, Dawn Cappelli, Thomas C. Caron (John Heinz III College, School of Information Systems Management, Carnegie Mellon University), Eric D. Shaw, Randall F. Trzeciak

In this paper, the authors describe general observations about, and a preliminary system dynamics model of, insider crime based on our empirical data.

June 2009 - White Paper Spotlight On: Insider Theft of Intellectual Property Inside the United States Involving Foreign Governments or Organizations (2009)

Topics: Insider Threat

Authors: Derrick Spooner, Dawn Cappelli, Andrew P. Moore, Randall F. Trzeciak

In this report, the authors focus on employees, contractors, and business partners who stole intellectual property to benefit a foreign entity.

April 2009 - Presentation Best Practices For Mitigating Insider Threat: Lessons Learned From 250 Cases

Topics: Insider Threat

Authors: Dawn Cappelli, Randall F. Trzeciak

In this presentation, Dawn Cappelli and Randy Trzeciak describe sixteen best practices for mitigating insider threats.

March 2009 - White Paper Spotlight On: Malicious Insiders with Ties to the Internet Underground Community

Topics: Insider Threat

Authors: Michael Hanley, Andrew P. Moore, Dawn Cappelli, Randall F. Trzeciak

In this report, the authors focus on insider threat cases in which the insider had relationships with the internet underground community.

January 2009 - White Paper Common Sense Guide to Prevention and Detection of Insider Threats 3rd Edition – Version 3.1

Topics: Insider Threat

Authors: Dawn Cappelli, Andrew P. Moore, Randall F. Trzeciak, Timothy J. Shimeall

In this paper, the authors present findings from examining insider crimes in a new way and add new practices that were not present in the second edition.

December 2008 - White Paper Spotlight On: Programming Techniques Used as an Insider Attack Tool

Topics: Insider Threat

Authors: Dawn Cappelli, Thomas C. Caron (John Heinz III College, School of Information Systems Management, Carnegie Mellon University), Randall F. Trzeciak, Andrew P. Moore

In this report, the authors focus on persons who use programming techniques to commit malicious acts against their organizations.

May 2008 - Technical Report The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures

Topics: Insider Threat

Authors: Andrew P. Moore, Dawn Cappelli, Randall F. Trzeciak

In this report, the authors describe seven observations about insider IT sabotage based on their empirical data and study findings.

April 2008 - Presentation Risk Mitigation Strategies: Lessons Learned from Actual Insider Attacks

Topics: Insider Threat

Authors: Dawn Cappelli, Andrew P. Moore

In this presentation, the authors describe different types of insider crime and best practices for mitigating that crime.

March 2008 - Podcast Insider Threat and the Software Development Life Cycle

Topics: Insider Threat

Authors: Dawn Cappelli, Julia H. Allen

In this podcast, Dawn Cappelli explains how insider threat vulnerabilities can be introduced during all phases of the software development lifecycle.

January 2008 - White Paper Insider Threat Study: Illicit Cyber Activity in the Information Technology and Telecommunications Sector

Topics: Insider Threat

Authors: Eileen Kowalski (United States Secret Service), Dawn Cappelli, Andrew P. Moore

In this paper, the authors present the findings of research examining reported insider incidents in the information technology and telecommunications sectors.

January 2008 - White Paper Insider Threat Study: Illicit Cyber Activity in the Government Sector

Topics: Insider Threat

Authors: Eileen Kowalski (United States Secret Service), Dawn Cappelli, Bradford J. Willke, Andrew P. Moore

In this paper, the authors present the findings of a research effort to examine reported insider incidents in the government sector.

December 2006 - Technical Report Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis

Topics: Process Improvement

Authors: Steven R. Band (Counterintelligence Field Activity - Behavioral Science Directorate), Dawn Cappelli, Lynn F. Fischer, Andrew P. Moore, Eric D. Shaw, Randall F. Trzeciak

In this report, the authors examine the psychological, technical, organizational, and contextual factors that contribute to espionage and insider sabotage.

November 2006 - Podcast Protecting Against Insider Threat

Topics: Insider Threat

Authors: Dawn Cappelli, Julia H. Allen

In this podcast, Dawn Cappelli describes the real and substantial threat of attack from insiders.

November 2006 - Presentation A Risk Mitigation Model: Lessons Learned From Actual Insider Sabotage

Topics: Insider Threat

Authors: Dawn Cappelli, Andrew P. Moore, Eric D. Shaw

In this presentation, the authors describe an interactive case example of insider threat, discuss key sabotage observations, and provide an overview of MERIT.

January 2006 - Presentation Insider Threats in the SDLC: Lessons Learned from Actual Incidents of Fraud, Theft of Sensitive Information and IT Sabotage

Topics: Insider Threat

Authors: Dawn Cappelli, Randall F. Trzeciak, Andrew P. Moore

In this 2006 presentation, the authors describe the lessons they learned from real-world fraud, theft, and sabotage incidents.

January 2006 - Presentation Pay Attention! What are Your Employees Doing?

Topics: Insider Threat

Authors: Dawn Cappelli

In this 2006 presentation, Dawn Cappelli discusses the insider threat, what the CERT Division is doing about it and what you need to know about it.

January 2006 - Presentation Insider Threats in the SDLC

Topics: Insider Threat

Authors: Dawn Cappelli, Andrew P. Moore, Randall F. Trzeciak

This presentation on insider threats in the SDLC was delivered by Dawn Cappelli, Andrew P. Moore, and Randy Trzeciak of the Software Engineering Institute's CERT Program in 2006.

November 2005 - Presentation Preventing Insider Sabotage: Lessons Learned From Actual Attacks

Topics: Insider Threat

Authors: Dawn Cappelli

In this 2005 presentation, Dawn Cappelli discusses preventing insider threat sabotage.

June 2005 - Technical Report Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector

Topics: Insider Threat

Authors: Marissa R. Randazzo (United States Secret Service), Michelle Keeney (United States Secret Service), Eileen Kowalski (United States Secret Service), Dawn Cappelli, Andrew P. Moore

In this 2005 report, the authors outline the ITS, a study of insider incidents identified by public reporting or in fraud cases from the Secret Service.

November 2004 - Presentation Insider Threat: Real Data on a Real Problem

Topics: Insider Threat, Measurement and Analysis

Authors: Dawn Cappelli, Michelle Keeney (United States Secret Service)

In this presentation, the authors discuss the e-Crime Watch survey and the USSS/CERT Insider Threat study.

August 2004 - Special Report Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector

Topics: Insider Threat

Authors: Dawn Cappelli, Andrew P. Moore, Marissa R. Randazzo (United States Secret Service), Michelle Keeney (United States Secret Service), Eileen Kowalski (United States Secret Service)

In this report, the authors present an overview of the Insider Threat Study (ITS), including its background, scope, study methods, and findings.

July 1987 - Technical Report The Use of Representation Clauses and Implementation-Dependent Features in Ada: IIA. Evaluation Questions

Authors: B. Craig Meyers, Dawn Cappelli

This report is the second in a series on the use of representation clauses and implementation-dependent features in Ada.

July 1987 - Technical Report The Use of Representation Clauses and Implementation-Dependent Features in Ada: IIIA. Qualitative Results for VAX Ada

Authors: B. Craig Meyers, Dawn Cappelli

This report, one in a series, provides a qualitative assessment of the support of representation clauses and implementation- dependent features in Ada provided by the VAX Ada compiler, Version 1.3.

July 1987 - Technical Report The Use of Representation Clauses and Implementation-Dependent Features in Ada: IIB. Experimental Procedures

Authors: B. Craig Meyers, Dawn Cappelli

This report is one in a series dealing with the use of representation clauses and implementation-dependent features in Ada. The purpose of this report is to discuss detailed experimental procedures to assess compiler support.

July 1987 - Technical Report The Use of Representation Clauses and Implementation-DependentFeatures in Ada: IVA. Qualitative Results for Ada/M(44)

Authors: B. Craig Meyers, Dawn Cappelli

This report, one in a series, provides a qualitative assessment of the support of representation clauses and implementation-dependent features in Ada provided by the Ada/M(44) compiler, Version 1.6.