Spotlight On: Malicious Insiders with Ties to the Internet Underground Community

reportActive / Technical Report | Accesssion Number: AD1147218 | Open PDF

Abstract:

In this article, we focus on insider threat cases in which the insider had relationships with the internet underground community. We begin by defining what we mean by the internet underground as it is used in the context of this article. We then provide a snapshot of the cases that focuses on who, what, why, and how. Next, we provide references to best practices that might have been effective in countering these incidents.

Security Markings

DOCUMENT & CONTEXTUAL SUMMARY

Distribution Code:
A - Approved For Public Release
Distribution Statement: Public Release

RECORD

Collection: TRECMS
Subject Terms