© Morey J. Haber and Brad Hibbert 2018
Morey J. Haber and Brad HibbertPrivileged Attack Vectorshttps://doi.org/10.1007/978-1-4842-3048-0_6

6. Insider Threats

Morey J. Haber and Brad Hibbert2
(1)
Heathrow, Florida, USA
(2)
Carp, Ontario, Canada
 
For most security professionals , they are tired of hearing about Insider Threats. They are not new; it is an old-school attack that has been made public due to the nature, quantity, and sensitivity of the data being stolen electronically. Years ago, these attacks occurred on a regular basis but did not have the same labels or stigma they have today. I am not saying they were acceptable back then either. We just need to be realistic about what an Insider Threat is and acknowledge that it has been going on in ...

Get Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.