Skip to main content

Currently Skimming:

3. Psychological, Social, Legal and Managerial Aspects of the Insider Threat
Pages 5-7

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 5...
... Differing Categories of and Motivations for presiders Participants acknowledged that defining the term 'insider' is difficult. Persons who constitute insider threats range from incompetent users making critical mistakes to moles who have been recruited, trained, and planted by nefarious outsiders; their motivations also vary widely and include the desire for recognition for hacking skills, ideological convictions, and monetary incentives.
From page 6...
... Others suggested that learning to infer behavior and intent from usage signatures could be very powerful, although it is not clear how to achieve that at this point. Furthennore, any such techniques inevitably run the risk of Incorrectly labeling problematic behavior acceptable, or, arguably worse, determining benign usage signatures to be indicative of inappropriate behavior or intent.
From page 7...
... One participant characterized the dilemma in both domains by paraphrasing directives from senior management and government as, "Collaborate with everybody but build systems that are resistant to attack." Legal Issues There are many legal aspects to the problem of the insider threat. First, the usual privacy and workplace surveillance issues need to be addressed when determining how, within an organization, to implement tools to decrease the possibility of insider malfeasance.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.