Insider Threat Control: Using Universal Serial Bus (USB) Device Auditing to Detect Possible Data Exfiltration by Malicious Insiders
This report presents methods to audit USB device use within a Microsoft Windows environment.
Resource Allocation in Dynamic Environments
When warfighting missions are conducted in a dynamic environment, the allocation of resources needed for mission operation can change from moment to moment. This report addresses two challenges of resource...
Insider Fraud in Financial Services
This brochure presents a summary of the findings of a recent study that analyzed insider and outsider computer criminal activity in the financial services sector to help security professionals prevent,...
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)
This book describes CERT’s findings in practical terms, offering specific guidance and countermeasures that can be immediately applied by senior officials within any organization.
Spotlight On: Malicious Insiders and Organized Crime Activity
This report defines malicious insiders and organized crime and provides a snapshot of who malicious insiders are, what and how they strike, and why.