Showing 1 - 10 of 15 results for the Author - andrew p. moore , Type - White Paper
In this paper, the authors describe the who, what, when, where, and how of attacks by insiders using programming techniques and includes case examples.
In this paper, the authors describe the potential ways an insider threat program (InTP) could go wrong and to engage the community to discuss its concerns.
In this paper, the authors describe general observations about, and a preliminary system dynamics model of, insider crime based on our empirical data.
In this paper, the authors describe the MERIT insider threat model and simulation results.
In this paper, the authors identify actions that may inadvertently lead to increased vulnerability to threats from employees, contractors, and clients.
This paper discusses the preliminary system dynamic maps of the insider cyber-threat and describes the main ideas behind the research proposal.
In this paper, the authors describe their efforts to perform risk assessment and analyze and design robust survivable systems.
In this article, the authors focus on cases in which the malicious insider was employed by a trusted business partner of the victim organization.
In this paper, the authors present the findings of research examining reported insider incidents in the information technology and telecommunications sectors.
In this report, the authors focus on persons who use programming techniques to commit malicious acts against their organizations.