Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Matthew L. Collins
December 2016 - Technical Report Common Sense Guide to Mitigating Insider Threats, Fifth Edition

Topics: Insider Threat

Authors: Matthew L. Collins, Michael C. Theis, Randall F. Trzeciak, Jeremy R. Strozer, Jason W. Clark, Daniel L. Costa, Tracy Cassidy, Michael J. Albrethsen, Andrew P. Moore

Presents recommendations for mitigating insider threat based on CERT's continued research and analysis of over 1,000 cases.

December 2016 - Technical Report The Critical Role of Positive Incentives for Reducing Insider Threats

Topics: Insider Threat

Authors: Andrew P. Moore, Jeff Savinda, Elizabeth A. Monaco, Jamie L. Moyes, Denise M. Rousseau (Carnegie Mellon University), Samuel J. Perl, Jennifer Cowley, Matthew L. Collins, Tracy Cassidy, Nathan VanHoudnos, Palma Buttles-Valdez, Daniel Bauer, Allison Parshall

This report describes how positive incentives complement traditional practices to provide a better balance for organizations’ insider threat programs.

May 2016 - Technical Report An Insider Threat Indicator Ontology

Topics: Insider Threat

Authors: Daniel L. Costa, Michael J. Albrethsen, Matthew L. Collins, Samuel J. Perl, George Silowash, Derrick Spooner

This report presents an ontology for insider threat indicators, describes how the ontology was developed, and outlines the process by which it was validated.

October 2015 - White Paper Effective Insider Threat Programs: Understanding and Avoiding Potential Pitfalls

Topics: Insider Threat

Authors: Andrew P. Moore, William E. Novak, Matthew L. Collins, Randall F. Trzeciak, Michael C. Theis

In this paper, the authors describe the potential ways an insider threat program (InTP) could go wrong and to engage the community to discuss its concerns.

December 2014 - Technical Note Pattern-Based Design of Insider Threat Programs

Topics: Insider Threat

Authors: Andrew P. Moore, Matthew L. Collins, Dave Mundie, Robin Ruefle, David McIntire

In this report, the authors describe a pattern-based approach to designing insider threat programs that could provide a better defense against insider threats.

November 2014 - Conference Paper An Incident Management Ontology

Topics: Incident Management

Authors: Dave Mundie, Robin Ruefle, Audrey J. Dorofee, John McCloud, Samuel J. Perl, Matthew L. Collins

In this paper, the authors describe the shortcomings of the incident management meta-model and how an incident management ontology addresses those shortcomings.

November 2014 - Conference Paper An Ontology for Insider Threat Indicators

Topics: Insider Threat

Authors: Daniel L. Costa, Matthew L. Collins, Samuel J. Perl, Michael J. Albrethsen, George Silowash, Derrick Spooner

In this paper, the authors describe their ongoing development of an insider threat indicator ontology.

October 2014 - Poster Insider Threat Mitigation Project

Topics: Insider Threat

Authors: Kathleen Carley (Carnegie Mellon School of Computer Science), Neal Altman, Geoff Morgan (Carnegie Mellon School of Computer Science), Matt Benigni (Carnegie Mellon School of Computer Science), Matthew L. Collins, Andrew P. Moore, William R. Claycomb

In this poster, the approach taken by the Insider Threat Mitigation Project is illustrated, including ego-centered and email-centered analyses.

July 2014 - Conference Paper Unintentional Insider Threats: A Review of Phishing and Malware Incidents by Economic Sector

Topics: Insider Threat

Authors: Jeremy R. Strozer, Matthew L. Collins, Tracy Cassidy

In this paper, the authors provide documented research to advance the understanding of the unintentional insider threat (UIT) that results from phishing and other social engineering cases, specifically those involving malicious software (malware).

December 2013 - White Paper Spotlight On: Programmers as Malicious Insiders–Updated and Revised

Topics: Insider Threat

Authors: Matthew L. Collins, Dawn Cappelli, Thomas C. Caron (John Heinz III College, School of Information Systems Management, Carnegie Mellon University), Randall F. Trzeciak, Andrew P. Moore

In this paper, the authors describe the who, what, when, where, and how of attacks by insiders using programming techniques and includes case examples.

October 2013 - Conference Paper Four Insider IT Sabotage Mitigation Patterns and an Initial Effectiveness Analysis

Topics: Insider Threat

Authors: Lori Flynn, Jason W. Clark, Andrew P. Moore, Matthew L. Collins, Eleni Tsamitis, Dave Mundie, David McIntire

In this paper, the authors describe four patterns of insider IT sabotage mitigation and initial results from 46 relevant cases for pattern effectiveness.

May 2013 - Technical Note Spotlight On: Insider Theft of Intellectual Property Inside the United States Involving Foreign Governments or Organizations (2013)

Topics: Insider Threat

Authors: Matthew L. Collins, Derrick Spooner, Dawn Cappelli, Andrew P. Moore, Randall F. Trzeciak

In this report, the authors provide a snapshot of individuals involved in insider threat cases and recommends how to mitigate the risk of similar incidents.