Skip to main content

Currently Skimming:

2. High-Grade Threats and High-Value Targets
Pages 3-5

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 3...
... (The reason is that individuals granted access to classified information routinely sign away many rights to privacy that most people take for granted.) During the course of the meeting, however, participants often expanded the discussion to include threats other than insider threats and to inclucle systems other than classified systems.
From page 4...
... In other words, serious security threats require serious attention on the part of the larger research and practitioner community. Any such efforts should encompass classified systems (national security 4
From page 5...
... Differing Categories of and Motivations for presiders Participants acknowledged that defining the term 'insider' is difficult. Persons who constitute insider threats range from incompetent users making critical mistakes to moles who have been recruited, trained, and planted by nefarious outsiders; their motivations also vary widely and include the desire for recognition for hacking skills, ideological convictions, and monetary incentives.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.