Abstract
They are not new; it is an old-school attack that has been made public due to the nature, quantity, and sensitivity of the data being stolen electronically. Years ago, these attacks occurred on a regular basis but did not have the same labels or stigma they have today. I am not saying they were acceptable back then either. We just need to be realistic about what an Insider Threat is and acknowledge that it has been going on in various forms for hundreds of years.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Morey J. Haber and Brad Hibbert
About this chapter
Cite this chapter
Haber, M.J., Hibbert, B. (2018). Insider Threats. In: Privileged Attack Vectors. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3048-0_6
Download citation
DOI: https://doi.org/10.1007/978-1-4842-3048-0_6
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-3047-3
Online ISBN: 978-1-4842-3048-0
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books