Four Insider IT Sabotage Mitigation Patterns and an Initial Effectiveness Analysis
October 2013 • Conference Paper
Lori Flynn, Jason W. Clark, Andrew P. Moore, Matthew L. Collins, Eleni Tsamitis, Dave Mundie, David McIntire
In this paper, the authors describe four patterns of insider IT sabotage mitigation and initial results from 46 relevant cases for pattern effectiveness.
The Hillside Group
This paper describes four patterns of insider IT sabotage mitigation and initial results from an investigation of 46 relevant cases for pattern effectiveness. The four IT sabotage mitigation patterns are represented in the case data, suggesting that some cases might have been prevented, detected earlier, or responded to more effectively if the suggested solutions were implemented. To our knowledge, there has been no previous successful demonstration or attempted use of the patterns described in this paper. The initial effectiveness analysis shows supporting but inconclusive results due to insufficient (case and baseline) data.