en.unionpedia.org

Insider threat, the Glossary

Index Insider threat

An insider threat is a perceived threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems.[1]

Table of Contents

  1. 21 relations: Carnegie Mellon University, CERT Coordination Center, Computer security, Data theft, Encryption, Federal Bureau of Investigation, Financial services, Forensic science, Graft (politics), Hyperlink, Logic bomb, Malware, Mole (espionage), Naval Criminal Investigative Service, Phishing, Scam, Shrinkage (accounting), Stochastic forensics, Technology specialist, Threat (computer security), White paper.

  2. Security breaches

Carnegie Mellon University

Carnegie Mellon University (CMU) is a private research university in Pittsburgh, Pennsylvania.

See Insider threat and Carnegie Mellon University

CERT Coordination Center

The CERT Coordination Center (CERT/CC) is the coordination center of the computer emergency response team (CERT) for the Software Engineering Institute (SEI), a non-profit United States federally funded research and development center.

See Insider threat and CERT Coordination Center

Computer security

Computer security (also cybersecurity, digital security, or information technology (IT) security) is the protection of computer systems and networks from threats that may result in unauthorized information disclosure, theft of (or damage to) hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

See Insider threat and Computer security

Data theft

Data theft is the unauthorized duplication or deletion of an organization's electronic information.

See Insider threat and Data theft

Encryption

In cryptography, encryption is the process of transforming (more specifically, encoding) information in a way that, ideally, only authorized parties can decode.

See Insider threat and Encryption

Federal Bureau of Investigation

The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency.

See Insider threat and Federal Bureau of Investigation

Financial services

Financial services are economic services tied to finance provided by financial institutions.

See Insider threat and Financial services

Forensic science

Forensic science, also known as criminalistics, is the application of science principles and methods to support legal decision-making in matters of criminal and civil law.

See Insider threat and Forensic science

Graft (politics)

Graft, as understood in American English, is a form of political corruption defined as the unscrupulous use of a politician's authority for personal gain.

See Insider threat and Graft (politics)

In computing, a hyperlink, or simply a link, is a digital reference to data that the user can follow or be guided to by clicking or tapping.

See Insider threat and Hyperlink

Logic bomb

A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.

See Insider threat and Logic bomb

Malware

Malware (a portmanteau of malicious software)Tahir, R. (2018). Insider threat and Malware are security breaches.

See Insider threat and Malware

Mole (espionage)

In espionage jargon, a mole (also called a "penetration agent", "deep cover agent", "illegal" or "sleeper agent") is a long-term spy (espionage agent) who is recruited before having access to secret intelligence, subsequently managing to get into the target organization. Insider threat and mole (espionage) are security breaches.

See Insider threat and Mole (espionage)

The United States Naval Criminal Investigative Service (NCIS) is the primary investigative law enforcement agency of the U.S. Department of the Navy.

See Insider threat and Naval Criminal Investigative Service

Phishing

Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware.

See Insider threat and Phishing

Scam

A scam, or a confidence trick, is an attempt to defraud a person or group after first gaining their trust.

See Insider threat and Scam

Shrinkage (accounting)

In accounting, shrinkage or shrink occurs when a retailer has fewer items in stock than were expected by the inventory list.

See Insider threat and Shrinkage (accounting)

Stochastic forensics

Stochastic forensics is a method to forensically reconstruct digital activity lacking artifacts, by analyzing emergent properties resulting from the stochastic nature of modern computers.

See Insider threat and Stochastic forensics

Technology specialist

An IT specialist, computer professional, or an IT professional may be.

See Insider threat and Technology specialist

Threat (computer security)

In computer security, a threat is a potential negative action or event enabled by a vulnerability that results in an unwanted impact to a computer system or application.

See Insider threat and Threat (computer security)

White paper

A white paper is a report or guide that informs readers concisely about a complex issue and presents the issuing body's philosophy on the matter.

See Insider threat and White paper

See also

Security breaches

References

[1] https://en.wikipedia.org/wiki/Insider_threat

Also known as Inside job, Inside jobs, Insider Threat Management, Insider attack.