O'Reilly logo

Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within by Julie Mehan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

INTRODUCTION

We have met the enemy and he is us. – Walt Kelly in Pogo*

It’s an unfortunate fact, but nations, companies, and individuals have frequently been betrayed by individuals in positions of trust – also known as insiders – and for a long time, the insider threat has largely been ignored in favor of the external hacker. Why? The external hacker is easier to detect, easier to control, and it is much more visible than the enemy from within. The reality is that insider threat activities have been occurring for a very long time and are still taking place but, since these attacks occur within the organization, they take place in private. High-profile public attacks are difficult to deny; the private attacks by insiders are much easier to hide. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required