LEADER 02820oam 2200529 450 001 9910715393303321 005 20210319080609.0 035 $a(CKB)5470000002510097 035 $a(OCoLC)70219144 035 $a(EXLCZ)995470000002510097 100 $a20060630d2005 ua 0 101 0 $aeng 135 $aurmn||||a|||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInsider threat study : computer system sabotage in critical infrastructure sectors /$fMichelle Keeney [and six others] 210 1$aWashington, DC :$cUnited States Secret Service,$d2005. 215 $a1 online resource (45 pages) 300 $a"May 2005." 320 $aIncludes bibliographical references. 327 $aIntroduction -- Prevalence of incidents of insider sabotage -- The insider threat study -- Characteristics of insider sabotage across critical infrastructure sectors -- Insider characteristics -- Organization characteristics -- Consequences to insiders -- Key findings of the insider threat study of sabotage across critical infrastructure sectors -- The insider's motive -- Pre-attack behavior and planning -- Advancing the attack -- Detecting the attack -- Consequences for targeted organizations -- Implications of the key findings for the prevention of insider sabotage -- The insider's motive -- Pre-attack behavior and planning -- Advancing the attack -- Detecting the attack -- Consequences for target organizations -- Conclusion: Reflections on the findings for the prevention of insider sabotage. 330 $aA new report from the Secret Service and the Carnegie Mellon Software Engineering Institute's CERT found that most acts of insider sabotage on computer systems in critical infrastructure sectors were perpetrated by former employees--motivated at least in part by a desire to seek revenge--who were granted system administrator or privileged access when hired. 517 $aInsider threat study 606 $aComputer networks$xSecurity measures$zUnited States 606 $aLaw enforcement$zUnited States 606 $aComputer networks$xSecurity measures$2fast 606 $aLaw enforcement$2fast 607 $aUnited States$2fast 615 0$aComputer networks$xSecurity measures 615 0$aLaw enforcement 615 7$aComputer networks$xSecurity measures. 615 7$aLaw enforcement. 700 $aKeeney$b Michelle$01421848 712 02$aUnited States.$bSecret Service, 801 0$bEEM 801 1$bEEM 801 2$bOCLCQ 801 2$bOCLCF 801 2$bOCLCQ 801 2$bGPO 801 2$bOCLCO 801 2$bGPO 906 $aBOOK 912 $a9910715393303321 996 $aInsider threat study : computer system sabotage in critical infrastructure sectors$93544300 997 $aUNINA