O'Reilly logo

The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) by Randall F. Trzeciak, Andrew P. Moore, Dawn M. Cappelli

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Glossary of Terms

access path: A sequence of one or more access points that lead to a critical system.

Ambitious Leader: A leader of an insider crime who recruits insiders to steal information for some larger purpose.

anonymous remailer: A server that receives email messages containing embedded instructions on where to forward them. The server then forwards the messages while also masking their originating location.

anti-spam blacklists: A system designed to block spam messages through a system of IP address filtering. Often functions in tandem with a content-recognition system.

backdoor account: An unauthorized account created for gaining access to a system or network known only to the person who created it.

behavioral precursor: An individual ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required