Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 26 results for the Critical Infrastructure Protection

White Paper | January 2008 - White Paper Insider Threat Study: Illicit Cyber Activity in the Information ...

In this paper, the authors present the findings of research examining reported insider incidents in information technology and telecommunications sectors.

White Paper | January 2008 - White Paper Insider Threat Study: Illicit Cyber Activity in the Government ...

In this paper, the authors present the findings of a research effort to examine reported insider incidents within the government sector.

White Paper | May 2005 - White Paper Secret Service and CERT Release Report Analyzing Acts of ...

This press release is the second in a series of reports focusing on insider threats to information systems and data in critical infrastructure sectors.

Technical Note | January 2014 - Technical Note A Proven Method for Identifying Security Gaps in International ... By Greg Crabb (United States Postal Service), Julia H. Allen, Pamela D. Curtis, Nader Mehravari

In this report, the authors describe a method of identifying physical security gaps in international mail processing centers and similar facilities.

Special Report | May 2005 - Special Report Insider Threat Study: Computer System Sabotage in Critical ... By Tara Conway (National Threat Assessment Center), Susan Keverline (National Threat Assessment Center), Michelle Keeney (United States Secret Service), Eileen Kowalski (United States Secret Service), Megan Williams (National Threat Assessment Center), Dawn Cappelli, Andrew P. Moore, Stephanie Rogers, Timothy J. Shimeall

In this report, the authors seek to close the gaps in the literature that make it difficult for organizations to fully understand the insider threat.

Special Report | July 2003 - Special Report International Liability Issues for Software Quality By Nancy R. Mead

In this 2003 report, Nancy Mead focuses on international liability as it relates to information security for critical infrastructure applications.

Technical Report | May 2016 - Technical Report Using Honeynets and the Diamond Model for ICS Threat ... By John Kotheimer, Kyle O'Meara, Deana Shick

This report presents an approach to analyzing approximately 16 gigabytes of full packet capture data collected from an industrial control system honeynet—a network of seemingly vulnerable machines designed to lure attackers.

White Paper | May 2016 - White Paper 2016: Current State of Cybercrime

This paper examines the current state of cybercrime and explores how organizations and individuals respond to cybercrime threats.

White Paper | August 2005 - White Paper Simulating Insider Cyber-Threat Risks: A Model-Based Case ... By Eliot Rich (University at Albany State University of New York), Howard F. Lipson, Dave Mundie, Jose M. Sarriegui (University of Navarra Spain), Agata Sawicka (Agder University College Norway), Thomas R. Stewart (University at Albany State University of New York), Jose M. Torres (University of Navarra Spain), Elise A. Weaver (Worcester Polytechnic Institute), Johannes Wiik (Agder University College Norway), Ignacio J. Martinez-Moyano (University at Albany State University of New York), Paul Conrad, Dawn Cappelli, Andrew P. Moore, Timothy J. Shimeall, David F. Andersen (University at Albany State University of New York), Jose J. Gonzalez (Agder University College Norway), Robert J. Ellison

In this paper, the authors identify actions that may inadvertently lead to increased vulnerability to threats from employees, contractors, and clients.

Presentation | November 2005 - Presentation Preventing Insider Sabotage: Lessons Learned From Actual ... By Dawn Cappelli

In this 2005 presentation, Dawn Cappelli discusses preventing insider threat sabotage.

Refine