The CERT Guide to Insider Threats How to Prevent, Detect, and Respond to Information Technology Crimes (theft, Sabotage, Fraud)

Sign up to use
Wikileaks recent data exposures demonstrate the danger now posed by insiders, who can often bypass physical and technical security measures designed to prevent unauthorized access. The insider threat team at CERT helps readers systematically identify, prevent, detect, and mitigate threats.

No reviews yet.
Be the first to write one.

No highlights yet.
Be the first to share one.