Ссылка | Дата | Объем в кбайтах | Число страниц | Справка |
Insider Threat Combating the enemy within | JULY 2010 | 485 | 7 | Атаки инсайдоров (своих сотрудников) |
Monitoring, Detecting and Preventing Insider Fraud and Abuse Dan Sullivan | 2012 | 429 | 20 | |
Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors Michelle Keeney et all | May 2005 | 167 | 45 | |
Insiders’ Guide to Evaluating Remote Control Software Three Fundamental Rules for Choosing the Best | 2012 | 111 | 9 | |
Protecting Against WikiLeaks Type Events and the Insider Threat | JANUARY 2011 | 158 | 10 | |
An Inside Track on Insider Threats | 2012 | 356 | 11 | |
Five Significant Insider Attacks Of 2012 | Dec 17, 2012 | 1279 | 6 | By Robert Lemos |
Monitoring, Detecting and Preventing Insider Fraud and Abuse | 2013 | 429 | 20 | Dan Sullivan |
The Risk of Insider Fraud U.S. Study of IT and Business Practitioners | October 2011 | 451 | 22 | Ponemon Institute |
In 2017, the Insider Threat Epidemic Begins | February 2017 | 2673 | 52 | James Scott, Drew Spaniel ICIT |