Showing 1 - 10 of 26 results for the Critical Infrastructure Protection
In this paper, the authors present the findings of research examining reported insider incidents in information technology and telecommunications sectors.
In this paper, the authors present the findings of a research effort to examine reported insider incidents within the government sector.
This press release is the second in a series of reports focusing on insider threats to information systems and data in critical infrastructure sectors.
In this report, the authors describe a method of identifying physical security gaps in international mail processing centers and similar facilities.
In this report, the authors seek to close the gaps in the literature that make it difficult for organizations to fully understand the insider threat.
In this 2003 report, Nancy Mead focuses on international liability as it relates to information security for critical infrastructure applications.
This report presents an approach to analyzing approximately 16 gigabytes of full packet capture data collected from an industrial control system honeynet,a network of seemingly vulnerable machines designed to lure attackers.
In this paper, the authors identify actions that may inadvertently lead to increased vulnerability to threats from employees, contractors, and clients.
In this 2005 presentation, Dawn Cappelli discusses preventing insider threat sabotage.
In this report, the authors present an overview of the Insider Threat Study (ITS), including its background, scope, study methods, and findings.