Accession Number:

AD1146097

Title:

Part 1: Analyzing Real-Life Cases; Assessing Risk and Raising Awareness Mitigating Insider Threat: New and Improved Practices Transcript

Descriptive Note:

[Technical Report, Other]

Corporate Author:

CARNEGIE-MELLON UNIV PITTSBURGH PA

Personal Author(s):

Report Date:

2009-01-01

Pagination or Media Count:

12

Abstract:

Our definition of a malicious insider is a current, or former, employee, contractor or business partner. Weve recently added the business partner aspect of that to the definition because of recent trends that were seeing. So its current or former employee, contractor, or business partner who has, or had, authorized access to your network, your systems, your data, and intentionally misused that access. So this is not looking at accidental data leakage. Although we would like to, we have not looked at that yet. So this is intentional misuse of your systems, data or network, and then what the negative consequences to the confidentiality, integrity, or availability of your information or your systems.

Subject Categories:

  • Computer Programming and Software
  • Computer Systems Management and Standards
  • Computer Programming and Software
  • Computer Systems Management and Standards

Distribution Statement:

[A, Approved For Public Release]