Preventing Insider Sabotage : Lessons Learned from Actual Attacks

Current
or former employees or contractors
who intentionally exceeded or misused an authorized level of access to
networks, systems or data in a manner that targeted a specific
individual or affected 
the security of the organization's data,
systems and/or daily business operations.

Good study by CERT presented at this year's CSI conference. Lots of interesting statistics.  Posted on Astalavista.

Advertisements

Author: Xavier Ashe

Entrepreneur, Infosec Executive, CISSP, CISM, Ironman triathlete, traveler, UU, paleo, father of 8, goyishe, gamer, & geek. http://linkedin.com/in/xavierashe

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s