The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)
by Dawn M. Cappelli, Andrew P. Moore, Randall F. Trzeciak
Chapter 4. Insider Fraud
Insider fraud: an insider’s use of IT for the unauthorized modification, addition, or deletion of an organization’s data (not programs or systems) for personal gain, or the theft of information that leads to an identity crime (identity theft, credit card fraud) [Weiland 2010].
Identity crime: the misuse of personal or financial identifiers in order to gain something of value and/or facilitate some other criminal activity.1
1. This definition comes from the Secret Service Web site: www.secretservice.gov/criminal.shtml.
We have two questions for you to consider. First, do you handle information that could be used to commit identity theft or credit card fraud? What would the repercussions be if that information was stolen? ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access