Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
32000 results found. Sorted by relevance | date | title .
Print Material
Author Keeney, Michelle, author.

Title Insider threat study : computer system sabotage in critical infrastructure sectors / Michelle Keeney [and six others].

Publication Info. Washington, DC : United States Secret Service, 2005.

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  HS 9.2:IN 7/2    ---  Available
Description 1 online resource (45 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Note "May 2005."
Bibliography Includes bibliographical references.
Contents Introduction -- Prevalence of incidents of insider sabotage -- The insider threat study -- Characteristics of insider sabotage across critical infrastructure sectors -- Insider characteristics -- Organization characteristics -- Consequences to insiders -- Key findings of the insider threat study of sabotage across critical infrastructure sectors -- The insider's motive -- Pre-attack behavior and planning -- Advancing the attack -- Detecting the attack -- Consequences for targeted organizations -- Implications of the key findings for the prevention of insider sabotage -- The insider's motive -- Pre-attack behavior and planning -- Advancing the attack -- Detecting the attack -- Consequences for target organizations -- Conclusion: Reflections on the findings for the prevention of insider sabotage.
Summary A new report from the Secret Service and the Carnegie Mellon Software Engineering Institute's CERT found that most acts of insider sabotage on computer systems in critical infrastructure sectors were perpetrated by former employees--motivated at least in part by a desire to seek revenge--who were granted system administrator or privileged access when hired.
System Details Mode of access: World Wide Web.
System requirements: Adobe Reader.
Note Description based on online resource; title from PDF cover (Secret Service website, viewed Feb. 9, 2021).
Publication from: United States Secret Service website.
Form Also issued in print.
Subject Computer networks -- Security measures -- United States.
Law enforcement -- United States.
Computer networks -- Security measures. (OCoLC)fst00872341
Law enforcement. (OCoLC)fst00993931
United States. (OCoLC)fst01204155
Added Author United States. Secret Service, issuing body.
Added Title Computer system sabotage in critical infrastructure sectors
Gpo Item No. 0520-L (online)
Sudoc No. HS 9.2:IN 7/2

 
    
Available items only