Chapter 35: Insider Threats

Review Questions/Exercises

True/False

1. False
2. True
3. True
4. False
5. True

Multiple Choice

1. E
2. A
3. B
4. D
5. C

Exercise

Solution

The following is a partial exercise solution. The students should be able to expand on the following:
These following insider threat standards shall include, but are not limited to, the following:
• Monitoring of user activity on the organization's networks. This refers to
• audit data collection strategies for insider threat detection, leveraging hardware and/or software with triggers deployed on private networks to detect, monitor, and analyze anomalous user behavior for indicators of misuse.
• Continued evaluation of personnel security information whereby information is gathered from, including ...

Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.