O'Reilly logo

The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) by Randall F. Trzeciak, Andrew P. Moore, Dawn M. Cappelli

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix B. Deeper Dive into the Data

We are constantly mining the CERT insider threat database for new and useful information, sometimes to support specific research and development activities, sometimes based on curiosity, and sometimes at the request of someone outside of our team. Frequently when we hold workshops or give conference presentations we are asked new questions that we have not yet explored in the data. We often take those queries back with us, ask our database experts to find the answers, and provide the answers to the person who asked. We also try to incorporate those answers into posts on our blog,1 in our workshops, and in new publications if applicable. The purpose of this appendix is to provide some of those details to you, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required