This tip is part of SearchSecurity.com's Intrusion Defense Security School lesson, Practical strategies to mitigate insider threats, featuring Dawn Cappelli. For additional resources visit our lesson home page, or to browse more Security School lessons, visit our Security School Course Catalog.
How much have you learned about detecting and mitigating insider threats? Find out in this short quiz.
The Insider Threat materials presented by Dawn Cappelli are copyright 2010 Carnegie Mellon University.
THE INSIDER THREAT MATERIALS ARE FURNISHED BY CARNEGIE MELLON UNIVERSITY AND ITS SOFTWARE ENGINEERING INSTITUTE ON AN “AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT.
CERT is a registered Service Mark of Carnegie Mellon University.
This was first published in August 2010