Chapter 8. Case Examples

We’ve already used many case examples throughout this book. This chapter presents an additional selection of cases from the CERT insider threat database.1 The descriptions used here were derived from a variety of public sources. While we tried to corroborate the details where we could, it was not always possible. Nevertheless, we believe many lessons can be learned from reviewing these cases—obviously, we have learned a lot from them over the years!

1. Some of these summaries were pulled from previously published works cited in other chapters. Others were pulled from the CERT insider threat database. We would like to recognize the many staff members on our team who have contributed to these summaries over the past ten ...

Get The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.