O'Reilly logo

The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) by Randall F. Trzeciak, Andrew P. Moore, Dawn M. Cappelli

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Insider Theft of Intellectual Property

Insider theft of intellectual property (IP): an insider’s use of IT to steal proprietary information from the organization. This category includes industrial espionage involving insiders.

Intellectual property: intangible assets created and owned by an organization that are critical to achieving its mission.1

The types of IP stolen in the cases in our database include the following:

• Proprietary software/source code

• Business plans, proposals, and strategic plans

• Customer information

• Product information (designs, formulas, schematics)

What if one of your scientists or engineers walked away with your most valuable trade secrets? Or a contract programmer whose contract ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required