Spotlight On: Malicious Insiders with Ties to the Internet Underground Community
Abstract:
In this article, we focus on insider threat cases in which the insider had relationships with the internet underground community. We begin by defining what we mean by the internet underground as it is used in the context of this article. We then provide a snapshot of the cases that focuses on who, what, why, and how. Next, we provide references to best practices that might have been effective in countering these incidents.
Security Markings
DOCUMENT & CONTEXTUAL SUMMARY
Distribution Code:
A - Approved For Public Release
Distribution Statement: Public Release
RECORD
Collection: TRECMS