Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Carly L. Huth
April 2014 - Technical Report International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany

Topics: Insider Threat

Authors: Lori Flynn, Carly L. Huth, Palma Buttles-Valdez, Michael C. Theis, George Silowash, Tracy Cassidy, Travis Wright (Carnegie Mellon University, Master of Science in Information Security Policy and Management Program), Randall F. Trzeciak

This report analyzes insider threat mitigation in India and Germany, using the new framework for international cybersecurity analysis described in the paper titled “Best Practices Against Insider Threats in All Nations.”

November 2013 - Webinar Components and Considerations in Building an Insider Threat Program

Topics: Insider Threat

Authors: Carly L. Huth, Robin Ruefle

In this November 2013 webinar, Carly Huth and Robin Ruefle discuss the key components you should consider when you're developing new insider threat programs.

August 2013 - Technical Note Best Practices Against Insider Threats in All Nations

Topics: Insider Threat

Authors: Lori Flynn, Carly L. Huth, Randall F. Trzeciak, Palma Buttles-Valdez

In this report, the authors summarize best practices for mitigating insider threats in international contexts.

December 2012 - White Paper Chronological Examination of Insider Threat Sabotage: Preliminary Observations

Topics: Insider Threat

Authors: William R. Claycomb, Carly L. Huth, Lori Flynn, David McIntire, Todd Lewellen

In this paper, the authors examine 15 cases of insider threat sabotage of IT systems to identify points in the attack time-line.

October 2012 - Conference Paper Best Practices Against Insider Threats in All Nations

Topics: Insider Threat

Authors: Lori Flynn, Carly L. Huth, Randall F. Trzeciak, Palma Buttles-Valdez

In this paper, the authors summarize best practices for mitigating insider threats in international contexts.

March 2012 - White Paper The Impact of Passive DNS Collection on End-User Privacy

Topics: Network Situational Awareness

Authors: Jonathan Spring, Carly L. Huth

In this paper, the authors discuss whether pDNS allows reconstruction of an end user's DNS behavior and if DNS behavior is personally identifiable information.