Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 29 results for the insider threat Type - White Paper

White Paper | October 2015 - White Paper Effective Insider Threat Programs: Understanding and ... By Andrew P. Moore, William E. Novak, Matthew L. Collins, Randall F. Trzeciak, Michael C. Theis

In this paper, the authors describe the potential ways an insider threat program (InTP) could go wrong and to engage the community to discuss its concerns.

White Paper | December 2012 - White Paper Chronological Examination of Insider Threat Sabotage ... By William R. Claycomb, Carly L. Huth, Lori Flynn, David McIntire, Todd Lewellen

In this paper, the authors examine 15 cases of insider threat sabotage of IT systems to identify points in the attack time-line.

White Paper | April 2013 - White Paper MERIT Interactive Insider Threat Training Simulator

In this paper, the authors describe how state-of-the-art multi-media technologies were used to develop the MERIT InterActive training simulator.

White Paper | August 2005 - White Paper Simulating Insider Cyber-Threat Risks: A Model-Based Case ... By Eliot Rich (University at Albany State University of New York), Howard F. Lipson, Dave Mundie, Jose M. Sarriegui (University of Navarra Spain), Agata Sawicka (Agder University College Norway), Thomas R. Stewart (University at Albany State University of New York), Jose M. Torres (University of Navarra Spain), Elise A. Weaver (Worcester Polytechnic Institute), Johannes Wiik (Agder University College Norway), Ignacio J. Martinez-Moyano (University at Albany State University of New York), Paul Conrad, Dawn Cappelli, Andrew P. Moore, Timothy J. Shimeall, David F. Andersen (University at Albany State University of New York), Jose J. Gonzalez (Agder University College Norway), Robert J. Ellison

In this paper, the authors identify actions that may inadvertently lead to increased vulnerability to threats from employees, contractors, and clients.

White Paper | July 2012 - White Paper Insider Threats to Cloud Computing: Directions for New ... By William R. Claycomb, Alex Nicoll

In this paper, the authors explain how cloud computing related insider threats are a serious concern, but that this threat has not been thoroughly explored.

White Paper | May 2016 - White Paper 2016 State of Cybercrime Survey

This paper examines the current state of cybercrime and explores how organizations and individuals respond to cybercrime threats.

White Paper | May 2008 - White Paper Management and Education of the Risk of Insider Threat ... By Dawn Cappelli, Akash G. Desai (Information Networking Institute - Carnegie Mellon University), Andrew P. Moore, Timothy J. Shimeall, Elise A. Weaver (Worcester Polytechnic Institute), Bradford J. Willke

In this paper, the authors describe the MERIT insider threat model and simulation results.

White Paper | January 2005 - White Paper Preliminary System Dynamics Maps of the Insider Cyber ... By David F. Andersen (University at Albany State University of New York), Elise A. Weaver (Worcester Polytechnic Institute), Aldo Zagonel (University at Albany - Rockefeller College of Public Affairs and Policy), Dawn Cappelli, Jose J. Gonzalez (Agder University College Norway), Mohammad Mojtahedzadeh (Attune Group - Inc.), Andrew P. Moore, Eliot Rich (University at Albany State University of New York), Jose M. Sarriegui (University of Navarra Spain), Timothy J. Shimeall, Jeffrey M. Stanton (Syracuse University - School of Information Studies)

This paper discusses the preliminary system dynamic maps of the insider cyber-threat and describes the main ideas behind the research proposal.

White Paper | January 2008 - White Paper Insider Threat Study: Illicit Cyber Activity in the Information ... By Eileen Kowalski (United States Secret Service), Dawn Cappelli, Andrew P. Moore

In this paper, the authors present the findings of research examining reported insider incidents in the information technology and telecommunications sectors.

White Paper | October 2012 - White Paper Spotlight On: Insider Threat from Trusted Business Partners ... By Todd Lewellen, Andrew P. Moore, Dawn Cappelli, Randall F. Trzeciak, Derrick Spooner, Robert Weiland (Carnegie Mellon University)

In this article, the authors focus on cases in which the malicious insider was employed by a trusted business partner of the victim organization.

Refine