Create an Account
username: password:
 
  MemeStreams Logo

Insider Threat Study: Illicit Cyber Activity in the Government Sector

search

possibly noteworthy
Picture of possibly noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

possibly noteworthy's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
Current Events
  War on Terrorism
Recreation
Local Information
  Food
Science
Society
  International Relations
  Politics and Law
   Intellectual Property
  Military
Sports
Technology
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Insider Threat Study: Illicit Cyber Activity in the Government Sector
Topic: Military Technology 10:43 pm EDT, Mar  9, 2008

The ITS government sector findings are presented in this section under four headings:

* The Insiders
* The Incidents
* Detecting the Incidents
* Consequences of the Incidents

The Insiders reports findings related to the characteristics of the individuals who perpetrated the incidents, their roles within the target organizations, their workplace behaviors, and their motives for carrying out their illicit activities. Information provided under The Incidents concerns the insiders’ pre-incident planning and technical information regarding methods for advancing the incidents. Detecting the Incidents presents findings concerning the manner in which the insiders’ illicit activities were uncovered and the insiders were identified. The final section, Consequences of the Incidents, is comprised of two subcategories. The first subcategory reports findings related to insiders’ perceptions of the potential consequences of their actions, disciplinary actions taken by the target organizations, charges filed, and the outcome of cases. The second subcategory describes the characteristics of the target organizations and the damages they incurred.

Thirty-six incidents and 38 insiders were examined within the ITS government sector. As noted, some research questions in this study concern the insider, while others bear on the incident. Accordingly, the denominator for statistics in this report will vary depending upon whether the finding pertains to the insider or the incident.

Insider Threat Study: Illicit Cyber Activity in the Government Sector



 
 
Powered By Industrial Memetics
RSS2.0