O'Reilly logo

The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) by Randall F. Trzeciak, Andrew P. Moore, Dawn M. Cappelli

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Case Examples

We’ve already used many case examples throughout this book. This chapter presents an additional selection of cases from the CERT insider threat database.1 The descriptions used here were derived from a variety of public sources. While we tried to corroborate the details where we could, it was not always possible. Nevertheless, we believe many lessons can be learned from reviewing these cases—obviously, we have learned a lot from them over the years!

The first section contains IT sabotage cases, followed by cases that were both sabotage and fraud, then theft of IP, fraud, and finally the miscellaneous cases. Within each section, the cases are sorted by the sector of the victim organization. Each section starts with a table ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required