Showing 1 - 10 of 29 results for the Critical Infrastructure Protection
In this paper, the authors present the findings of research examining reported insider incidents in the information technology and telecommunications sectors.
In this paper, the authors present the findings of a research effort to examine reported insider incidents in the government sector.
This press release is the second in a series of reports focusing on insider threats to information systems and data in critical infrastructure sectors.
In this report, the authors describe a method of identifying physical security gaps in international mail processing centers and similar facilities.
In this report, the authors seek to close the gaps in the literature that make it difficult for organizations to fully understand the insider threat.
In this 2003 report, Nancy Mead focuses on international liability as it relates to information security for critical infrastructure applications.
This report presents an approach to analyzing approximately 16 gigabytes of full packet capture data collected from an industrial control system honeynet—a network of seemingly vulnerable machines designed to lure attackers.
This paper examines the current state of cybercrime and explores how organizations and individuals respond to cybercrime threats.
In this paper, the authors identify actions that may inadvertently lead to increased vulnerability to threats from employees, contractors, and clients.
In this 2005 presentation, Dawn Cappelli discusses preventing insider threat sabotage.