O'Reilly logo

The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) by Randall F. Trzeciak, Andrew P. Moore, Dawn M. Cappelli

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Insider Fraud

Insider fraud: an insider’s use of IT for the unauthorized modification, addition, or deletion of an organization’s data (not programs or systems) for personal gain, or the theft of information that leads to an identity crime (identity theft, credit card fraud) [Weiland 2010].

Identity crime: the misuse of personal or financial identifiers in order to gain something of value and/or facilitate some other criminal activity.1

We have two questions for you to consider. First, do you handle information that could be used to commit identity theft or credit card fraud? What would the repercussions be if that information was stolen? With current data breach notification laws, keeping the theft a secret is probably not an option, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required