O'Reilly logo

The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) by Randall F. Trzeciak, Andrew P. Moore, Dawn M. Cappelli

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Conclusion and Miscellaneous Issues

This chapter wraps up the book by covering two miscellaneous issues that we mentioned briefly but did not cover in detail earlier: insider threats from trusted business partners, and malicious insiders with ties to the Internet underground. We conclude with a final summary, which could serve as a handy reference should you need a “cheat sheet” for future discussions on insider threat.

Insider Threat from Trusted Business Partners

Trusted business partner (TBP): any external organization or individual an organization has contracted to perform a service for the organization. The nature of this service requires the organization to provide the TBP authorized access to proprietary data, critical files, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required