2011
DOI: 10.21236/ada589594
|View full text |Cite
|
Sign up to set email alerts
|

A Preliminary Model of Insider Theft of Intellectual Property

Abstract: A study conducted by the CERT ® Program at Carnegie Mellon University's Software Engineering Institute analyzed hundreds of insider cyber crimes across U.S. critical infrastructure sectors. Follow-up work involved detailed group modeling and analysis of 48 cases of insider theft of intellectual property. In the context of this paper, insider theft of intellectual property includes incidents in which the insider's primary goal is stealing confidential or proprietary information from the organization. This paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
39
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 40 publications
(39 citation statements)
references
References 12 publications
0
39
0
Order By: Relevance
“…There are several key features of this type of attack. First, the target tends to be product information, proprietary software and source code (these are clear targets in CMU-CERT studies [12]). Also, attacks appear more likely to be conducted by technical personnel (e.g., scientists and engineers) [6] and using technical means (54% of insiders used either email, remote access channel or network file transfer [11]) rather than physical theft of prototypes, for example.…”
Section: Types Of Insider Threatmentioning
confidence: 99%
See 2 more Smart Citations
“…There are several key features of this type of attack. First, the target tends to be product information, proprietary software and source code (these are clear targets in CMU-CERT studies [12]). Also, attacks appear more likely to be conducted by technical personnel (e.g., scientists and engineers) [6] and using technical means (54% of insiders used either email, remote access channel or network file transfer [11]) rather than physical theft of prototypes, for example.…”
Section: Types Of Insider Threatmentioning
confidence: 99%
“…Also, attacks appear more likely to be conducted by technical personnel (e.g., scientists and engineers) [6] and using technical means (54% of insiders used either email, remote access channel or network file transfer [11]) rather than physical theft of prototypes, for example. Finally, a majority of these thefts are committed by employees with legitimate access to the stolen IP; almost 75% stole material they had authorized access to [12]. Although 75% is a strong statistic and it is therefore very tempting to monitor only these individuals for this attack, yet as other articles have highlighted (e.g., the case of the foreign national who stole Ford secrets worth in excess of $50 million [13]), insiders with no legitimate access are also causing a great deal of harm.…”
Section: Types Of Insider Threatmentioning
confidence: 99%
See 1 more Smart Citation
“…We believe that there is a single distinguishing characteristic in many of these cases: as a preparation to exfiltrating data, insiders will collect it on a single system, typically a workstation under their control [2]. As such, the storage profile of this workstation changes in significant ways.…”
Section: Introductionmentioning
confidence: 99%
“…Here feedback encryption is an encryption technique, in which a computational result of an encryption round R is fed back to the encryption mechanism for the next encryption round, i.e., Round R+1, as a part of (R+1)'s inputs, thereby increasing the unpredictability of ciphertext. The three-dimensional operation, referring to three different computations, includes an addition (+) [8,9], exclusive-or (⊕), and exclusive-and (⊙), when encrypting a plaintext block. The purpose is to increase the encryption complexity so as to reduce the probability of cracking the encryption process by hackers.…”
Section: Introductionmentioning
confidence: 99%