Showing 1 - 10 of 29 results for the insider threat Type - White Paper
In this paper, the authors describe the potential ways an insider threat program (InTP) could go wrong and to engage the community to discuss its concerns.
In this paper, the authors examine 15 cases of insider threat sabotage of IT systems to identify points in the attack time-line.
In this paper, the authors describe how state-of-the-art multi-media technologies were used to develop the MERIT InterActive training simulator.
In this paper, the authors identify actions that may inadvertently lead to increased vulnerability to threats from employees, contractors, and clients.
In this paper, the authors explain how cloud computing related insider threats are a serious concern, but that this threat has not been thoroughly explored.
This paper examines the current state of cybercrime and explores how organizations and individuals respond to cybercrime threats.
In this paper, the authors describe the MERIT insider threat model and simulation results.
This paper discusses the preliminary system dynamic maps of the insider cyber-threat and describes the main ideas behind the research proposal.
In this paper, the authors present the findings of research examining reported insider incidents in the information technology and telecommunications sectors.
In this article, the authors focus on cases in which the malicious insider was employed by a trusted business partner of the victim organization.