CHAPTER 2: INSIDER ATTACKS
Insider attack classification
We classify attacks into their ultimate effects on the organisation of damage, fraud and theft to satisfy the goals of the attacker. This follows the classification used in the CERT Common Sense Guide to Prevention and Detection of Insider Threats, which is recommended as further reading. We also mention attacks motivated by curiosity, or enjoyment, without clearly defined goals that may inadvertently cause problems. The attacks have these undesirable impacts indirectly by breaching the fundamental security services of confidentiality, integrity and availability usually at lower layers. These problems may also be caused by accidental failure, or external attack, which are allowed by ...
Get The Insider Threat now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.