Quiz: Practical strategies to mitigate insider threats

How much have you learned about detecting and mitigating insider threats? Find out in this short quiz.

SearchSecurity.com Security School
 

This tip is part of SearchSecurity.com's Intrusion Defense Security School lesson, Practical strategies to mitigate insider threats, featuring Dawn Cappelli. For additional resources visit our lesson home page, or to browse more Security School lessons, visit our Security School Course Catalog.

How much have you learned about detecting and mitigating insider threats? Find out in this short quiz.

The Insider Threat materials presented by Dawn Cappelli are copyright 2010 Carnegie Mellon University.

NO WARRANTY

THE INSIDER THREAT MATERIALS ARE FURNISHED BY CARNEGIE MELLON UNIVERSITY AND ITS SOFTWARE ENGINEERING INSTITUTE ON AN “AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT.

CERT is a registered Service Mark of Carnegie Mellon University.

This was last published in August 2010

Dig Deeper on Security Awareness Training and Internal Threats-Information

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close