The design of framework for detecting an insider's leak of confidential information
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
A proposal for automating investigations in live forensics
Computer Standards & Interfaces
Learning from your elders: a shortcut to information security management success
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Hi-index | 0.00 |
This article reviews recent empirical evidence garnered from inductive studies of insiders examining ''who, what, where, when, why and how'' of insider computer attacks. These results are then compared to insider ''theories'' and folklore. Then the use of a specific deductive profiling approach to insider investigation and case management is described along with illustrative case studies. The overall role of the behavioral consultant in insider cases is examined with emphasis on specific forms of support for the investigative team and aid to managers and security personnel with case management of insiders within corporate environments.