O'Reilly logo

The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) by Randall F. Trzeciak, Andrew P. Moore, Dawn M. Cappelli

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

A

Acceptable use policies for sabotage, 42, 48

Acceptable workplace behavior, 168

Access and access controls

Ambitious Leader model, 8081

description, 179

erosion of, 71, 189

fraud, 125

Internet underground, 291292

logs, 172173

remote, 9092, 200201

SDLC, 132133

separation of duties and least privilege, 178181

source code, 131, 142

system change controls, 193

after termination, 203206

Access paths

eliminating, 5052

sabotage, 4045

Access rights management, 284

Accomplices

fraud, 103, 121, 269

information collection on, 328

theft of IP, 86

Accountability of third-party vendors, 57

Accounts and account management

expiration dates, 234

organized crime, 118

policies and practices, 174177

for sabotage, 45, 52

terminated employees, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required