DOI: 10.1007/978-0-387-77322-3_3
|View full text |Cite
|
Sign up to set email alerts
|

The “Big Picture” of Insider IT Sabotage Across U.S. Critical Infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
46
0

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 44 publications
(47 citation statements)
references
References 1 publication
1
46
0
Order By: Relevance
“…In such a model, to reach a sensitive asset d i , an insider needs to have known or unknown access paths to asset d i (Ellard & Megquier, 2004;Kowalski et al, 2008;Moore, Cappelli, & Trzeciak, 2008 A specific access path can be USB access, CD access, VM instance access, email access, or any other access mechanism that allows users to access the sensitive asset, in legitimately way or illegitimately way. For example, to steal an asset d i for personal use, an insider may copy asset d i from the data storage site and then send to a personal USB device that has been attached to a system within a healthcare enterprise environment.…”
Section: 12mentioning
confidence: 99%
See 2 more Smart Citations
“…In such a model, to reach a sensitive asset d i , an insider needs to have known or unknown access paths to asset d i (Ellard & Megquier, 2004;Kowalski et al, 2008;Moore, Cappelli, & Trzeciak, 2008 A specific access path can be USB access, CD access, VM instance access, email access, or any other access mechanism that allows users to access the sensitive asset, in legitimately way or illegitimately way. For example, to steal an asset d i for personal use, an insider may copy asset d i from the data storage site and then send to a personal USB device that has been attached to a system within a healthcare enterprise environment.…”
Section: 12mentioning
confidence: 99%
“…Therefore, forensics investigation on inside activities in healthcare enterprise environment, including incident detection and reconstruction is critically needed (Tu et al, 2012). Current research on inside threat detection and identification (Eberle & Holder, 2009;Moore, Cappelli, & Trzeciak, 2008;Phua, Lee, Smith, & Gayler, 2007) and event reconstruction mechanisms (Case et al, 2008;Tang, & Daniels, 2005;Tu et al, 2012) are limited in real world since they require a comprehensive set of information including social information and explicit dependence knowledge, which are not available in an enterprise environment. Hence, a novel mechanisms are critical to identify potential inside activity and reconstruct the inside activity for tracking.…”
Section: Insider Activity Identification and Trackingmentioning
confidence: 99%
See 1 more Smart Citation
“…Band et al [BCF + 06] and Moore et al [MCT08] summarize findings that reveal behaviors, motivations, and personality disorders associated with insider crimes such as antisocial or narcissistic personality. Anecdotal research is post hoc, mostly derived from interviews with convicted criminals, and speculative in its predictive value.…”
Section: Psychological Indicator-based Assessmentmentioning
confidence: 99%
“…A complementary approach is to develop instructional methods to raise managers' awareness of, and enhance their ability to detect, the warning signs of potential insider attacks. Examples of this approach are the workshops and interactive training that US-CERT [MCT08] offers, and a research and development program at the Office of the Secretary of Defense that is developing game-based methodologies to be used in this approach [DOD08].…”
Section: Psychological Indicator-based Assessmentmentioning
confidence: 99%