Keywords
Risk Mitigation Strategies: Lessons Learned from Actual Insider Attacks
Software Engineering Institute
Standards groups
Current or former employee, contractor, or other business partner who
has or had authorized access to an organization’s network, system or data and
intentionally exceeded or misused that access in a manner that
negatively affected the confidentiality, integrity, or availability of the organization’s information or information systems.
Defines standard
Replaced/Superseded by document(s)
Cancelled by
Amended by
File | MIME type | Size (KB) | Language | Download | |
---|---|---|---|---|---|
2011-09-22 Insider threat presentation.pdf | application/pdf | 1.52 MB | English | DOWNLOAD! |