O'Reilly logo

The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) by Randall F. Trzeciak, Andrew P. Moore, Dawn M. Cappelli

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Footnotes

Preface

1. Malware: code intended to execute a malicious function; also commonly referred to as malicious code. [Note: The first time any word from the Glossary is used in the book it will be printed in boldface.]

2. For information regarding the WikiLeaks insider threat cases, see http://en.wikipedia.org/wiki/Wikileaks.

3. Henceforth, for simplicity, reference to insider threats specifically means malicious insider threats unless otherwise specified.

4. Dictionary of Military and Associated Terms. U.S. Department of Defense, 2005.

5. Whatis.com

6. Note that in some years Deloitte and Microsoft also participated in the survey.

7. “System dynamics is a computer-aided approach to policy analysis and design. It applies to dynamic problems ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required