Showing 1 - 10 of 15 results for the Author - andrew p. moore , Type - White Paper
In this paper, the authors describe the who, what, when, where, and how of attacks by insiders using programming techniques and includes case examples.
In this paper, the authors describe the potential ways an insider threat program (InTP) could go wrong and to engage the community to discuss its concerns.
In this paper, the authors describe general observations about, and a preliminary system dynamics model of, insider crime based on our empirical data.
In this paper, the authors describe the MERIT insider threat model and simulation results.
In this paper, the authors describe their efforts to perform risk assessment and analyze and design robust survivable systems.
This paper discusses the preliminary system dynamic maps of the insider cyber-threat and describes the main ideas behind the research proposal.
In this paper, the authors identify actions that may inadvertently lead to increased vulnerability to threats from employees, contractors, and clients.
In this paper, the authors present the findings of research examining reported insider incidents in the information technology and telecommunications sectors.
In this paper, the authors present the findings of a research effort to examine reported insider incidents in the government sector.
In this article, the authors focus on cases in which the malicious insider was employed by a trusted business partner of the victim organization.