CHAPTER 2: INSIDER THREAT MODELS AND INDICATORS

I believe in rules. Sure I do. If there weren’t any rules, how could I break them? – Leo Durocher*37

Recent research into insider threat modelling by such organizations as the Carnegie Mellon University Software Engineering Institute (CMU SEI) and the UK’s Centre for the Protection of National Infrastructure (CPNI) has resulted in a more comprehensive picture of possible indications and warnings, observables, and actions to mitigate the threat. This section includes case studies of insider threat drawn from history and recent events.

There is no single profile of an individual who is likely to develop into an insider threat. insider threats do not carry a sign or have a mark on their forehead. They ...

Get Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.