The CERT Guide to Insider Threats

The CERT Guide to Insider Threats How to Prevent, Detect, and Respond to Information Technology Crimes (theft, Sabotage, Fraud)

Wikileaks recent data exposures demonstrate the danger now posed by insiders, who can often bypass physical and technical security measures designed to prevent unauthorized access. The insider threat team at CERT helps readers systematically identify, prevent, detect, and mitigate threats.
Sign up to use