O'Reilly logo

The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) by Randall F. Trzeciak, Andrew P. Moore, Dawn M. Cappelli

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

References

[1] URLs are valid as of the publication date of this book.

[2] AICPA 2002 American Institute for CPA. Consideration of Fraud in a Financial Statement Audit (AU 316.02). American Institute for CPA, 2002; www.aicpa.org/Research/Standards/AuditAttest/DownloadableDocuments/AU-00316.pdf.

[3] Alberts 2003 C. Alberts and A. Dorofee. Managing Information Security Risks: The OCTAVE® Approach (Boston: Addison-Wesley, 2003).

[4] Andersen 2004 D.F. Andersen, D.M. Cappelli, J.J. Gonzalez, M. Mojtahedzadeh, A.P. Moore, E. Rich, J.M. Sarriegui, T.J. Shimeall, J.M. Stanton, E. Weaver, and A. Zagonel. “Preliminary System Dynamics Maps of the Insider Cyber-Threat Problem.” In Proceedings of the 22nd International Conference of the System Dynamics Society, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required