Skip to main content

Insider Threats

  • Chapter
  • First Online:
Privileged Attack Vectors
  • 1375 Accesses

Abstract

They are not new; it is an old-school attack that has been made public due to the nature, quantity, and sensitivity of the data being stolen electronically. Years ago, these attacks occurred on a regular basis but did not have the same labels or stigma they have today. I am not saying they were acceptable back then either. We just need to be realistic about what an Insider Threat is and acknowledge that it has been going on in various forms for hundreds of years.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 19.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Morey J. Haber and Brad Hibbert

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Haber, M.J., Hibbert, B. (2018). Insider Threats. In: Privileged Attack Vectors. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3048-0_6

Download citation

Publish with us

Policies and ethics