Footnotes

Preface

1. Malware: code intended to execute a malicious function; also commonly referred to as malicious code. [Note: The first time any word from the Glossary is used in the book it will be printed in boldface.]

2. For information regarding the WikiLeaks insider threat cases, see http://en.wikipedia.org/wiki/Wikileaks.

3. Henceforth, for simplicity, reference to insider threats specifically means malicious insider threats unless otherwise specified.

4. Dictionary of Military and Associated Terms. U.S. Department of Defense, 2005.

5. Whatis.com

6. Note that in some years Deloitte and Microsoft also participated in the survey.

7. “System dynamics is a computer-aided approach to policy analysis and design. It applies to dynamic problems ...

Get The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.