Encyclopedia of Database Systems

2018 Edition
| Editors: Ling Liu, M. Tamer Özsu

Protection from Insider Threats

  • William R. Claycomb
  • John McCloud
Reference work entry
DOI: https://doi.org/10.1007/978-1-4614-8265-9_80602

Synonyms

Insider; Spy

Definition

Insider threats can be either malicious or unintentional.

A malicious insider threat is any current or former employee, contractor, or other business partner who has or had authorized access to an organization’s network, system, or data and intentionally exceeded or misused that access in a manner that negatively affected the confidentiality, integrity, or availability of the organization’s information or information systems.

An unintentional insider threat is a current or former employee, contractor, or other business partner who has or had authorized access to an organization’s network, system, or data and who, through action/inaction and without malicious intent, causes harm or substantially increases the probability of future harm to the confidentiality, integrity, or availability of the organization’s information or information systems.

The content of this entry will describe malicious insider threats only.

Malicious insiders pose a substantial...

This is a preview of subscription content, log in to check access.

References

  1. 1.
    Cappelli D, Moore AP, Trzeciak RF. The CERT guide to insider threats. 1st ed. New York: Addison-Wesley Professional; 2012.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.CERT Insider Threat Center, Software Engineering InstituteCarnegie Mellon UniversityPittsburghUSA

Section editors and affiliations

  • Elena Ferrari
    • 1
  1. 1.DiSTAUniv. of InsubriaVareseItaly