O'Reilly logo

Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within by Julie Mehan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 2: INSIDER THREAT MODELS AND INDICATORS

I believe in rules. Sure I do. If there weren’t any rules, how could I break them? – Leo Durocher*37

Recent research into insider threat modelling by such organizations as the Carnegie Mellon University Software Engineering Institute (CMU SEI) and the UK’s Centre for the Protection of National Infrastructure (CPNI) has resulted in a more comprehensive picture of possible indications and warnings, observables, and actions to mitigate the threat. This section includes case studies of insider threat drawn from history and recent events.

There is no single profile of an individual who is likely to develop into an insider threat. insider threats do not carry a sign or have a mark on their forehead. They ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required