niac_insider_threat_to_critical_infrastructures_study

niac_insider_threat_to_critical_infrastructures_study - T...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: T HE N ATIONAL I NFRASTRUCTURE A DVISORY C OUNCIL ’ F INAL R EPORT AND R ECOMMENDATIONS ON THE I NSIDER T HREAT TO C RITICAL I NFRASTRUCTURE S A PRIL 8, 2008 T HOMAS N OONAN E DMUND A RCHULETA F ORMER G ENERAL M ANAGER P RESIDENT AND CEO IBM I NTERNET S ECURITY S YSTEMS E L P ASO W ATER U TILITIES S This page intentionally left blank. Table of Contents I. A CKNOWLEDGEMENTS ....................................................................................................3 II. E XECUTIVE S UMMARY ....................................................................................................4 III. B ACKGROUND ON THE NIAC........................................................................................10 IV. B ACKGROUND ON THE I NSIDER T HREAT S TUDY ...........................................................10 V. A PPROACH ....................................................................................................................10 VI. P HASE I – F INDINGS ......................................................................................................11 A. Defining the Insider Threat.......................................................................................11 B. Scope and Dynamics.................................................................................................12 Potential Actors and Motivations .............................................................................14 Psychology of the Insider ..........................................................................................15 Economic Espionage .................................................................................................17 Variation among the Sectors on Maturity and Awareness .......................................17 Technology Dynamics and the Insider Threat ..........................................................18 C. Globalization.............................................................................................................20 D. Obstacles to Addressing the Insider Threat ..............................................................21 Lack of Information Sharing .....................................................................................21 Needed Research on Insider Threats ........................................................................22 Needed Education and Awareness ............................................................................22 Managing and Maintaining Employee Identification ...............................................23 Uneven Background Screening Practices .................................................................23 Technology Challenges .............................................................................................24 Cultural and Organizational Obstacles ....................................................................24 VII. P HASE II – F INDINGS .....................................................................................................26 ....
View Full Document

This note was uploaded on 12/13/2011 for the course CSCE 727 taught by Professor Staff during the Spring '11 term at South Carolina.

Page1 / 56

niac_insider_threat_to_critical_infrastructures_study - T...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online