Article ID Journal Published Year Pages File Type
458362 Digital Investigation 2006 12 Pages PDF
Abstract

This article reviews recent empirical evidence garnered from inductive studies of insiders examining "who, what, where, when, why and how" of insider computer attacks. These results are then compared to insider "theories" and folklore. Then the use of a specific deductive profiling approach to insider investigation and case management is described along with illustrative case studies. The overall role of the behavioral consultant in insider cases is examined with emphasis on specific forms of support for the investigative team and aid to managers and security personnel with case management of insiders within corporate environments.

Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
,