This report examines previous research on malicious insiders with particular emphasis on the social and psychological factors that may have influenced the attacker and their behaviours. This research also draws on corresponding studies into fraud and espionage in non IT scenarios. A range of preventative measures is presented that approach the problem from personnel, policy and technical perspectives. Given the relative scarcity of research into non-technical aspects of malicious insider attacks, further recommendations are also made to study malicious insiders, involving both government and academic stakeholders. Such research has the potential to provide further preventative measures
An insider is a person that has or had a legitimate right to access computing resources of an organi...
This paper sets out 99 case studies of insider attacks that took place in the UK. The study involved...
Current and former employees, contractors, and other organizational "insiders" pose a substantial th...
Malicious insiders continuously pose a great threat to organizations. With their knowledge about the...
The purpose of this research is to identify the factors that influence organizational insiders to vi...
Insider threats, or attacks against a company from within, are a pressing issue both domestically an...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
This paper looks at a number of issues relating to the malicious insider and the nature of motivatio...
Organisations today operate in a world fraught with threats, including 'script kiddies', hackers, ha...
<p>The research documented in this report seeks to advance the understanding of the unintentional in...
This paper looks at a number of issues relating to the malicious insider and the nature of motivatio...
A great deal of research has been devoted to the exploration and categorization of threats posed fro...
The threat that insiders pose to businesses, institutions and governmental organisations continues t...
Abstract insiders (an analyst, application administrator, and system administrator), measuring timel...
An insider is a person that has or had a legitimate right to access computing resources of an organi...
This paper sets out 99 case studies of insider attacks that took place in the UK. The study involved...
Current and former employees, contractors, and other organizational "insiders" pose a substantial th...
Malicious insiders continuously pose a great threat to organizations. With their knowledge about the...
The purpose of this research is to identify the factors that influence organizational insiders to vi...
Insider threats, or attacks against a company from within, are a pressing issue both domestically an...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
This paper looks at a number of issues relating to the malicious insider and the nature of motivatio...
Organisations today operate in a world fraught with threats, including 'script kiddies', hackers, ha...
<p>The research documented in this report seeks to advance the understanding of the unintentional in...
This paper looks at a number of issues relating to the malicious insider and the nature of motivatio...
A great deal of research has been devoted to the exploration and categorization of threats posed fro...
The threat that insiders pose to businesses, institutions and governmental organisations continues t...
Abstract insiders (an analyst, application administrator, and system administrator), measuring timel...
An insider is a person that has or had a legitimate right to access computing resources of an organi...
This paper sets out 99 case studies of insider attacks that took place in the UK. The study involved...
Current and former employees, contractors, and other organizational "insiders" pose a substantial th...