Insider threat, the Glossary
An insider threat is a perceived threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems.[1]
Table of Contents
21 relations: Carnegie Mellon University, CERT Coordination Center, Computer security, Data theft, Encryption, Federal Bureau of Investigation, Financial services, Forensic science, Graft (politics), Hyperlink, Logic bomb, Malware, Mole (espionage), Naval Criminal Investigative Service, Phishing, Scam, Shrinkage (accounting), Stochastic forensics, Technology specialist, Threat (computer security), White paper.
- Security breaches
Carnegie Mellon University
Carnegie Mellon University (CMU) is a private research university in Pittsburgh, Pennsylvania.
See Insider threat and Carnegie Mellon University
CERT Coordination Center
The CERT Coordination Center (CERT/CC) is the coordination center of the computer emergency response team (CERT) for the Software Engineering Institute (SEI), a non-profit United States federally funded research and development center.
See Insider threat and CERT Coordination Center
Computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is the protection of computer systems and networks from threats that may result in unauthorized information disclosure, theft of (or damage to) hardware, software, or data, as well as from the disruption or misdirection of the services they provide.
See Insider threat and Computer security
Data theft
Data theft is the unauthorized duplication or deletion of an organization's electronic information.
See Insider threat and Data theft
Encryption
In cryptography, encryption is the process of transforming (more specifically, encoding) information in a way that, ideally, only authorized parties can decode.
See Insider threat and Encryption
Federal Bureau of Investigation
The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency.
See Insider threat and Federal Bureau of Investigation
Financial services
Financial services are economic services tied to finance provided by financial institutions.
See Insider threat and Financial services
Forensic science
Forensic science, also known as criminalistics, is the application of science principles and methods to support legal decision-making in matters of criminal and civil law.
See Insider threat and Forensic science
Graft (politics)
Graft, as understood in American English, is a form of political corruption defined as the unscrupulous use of a politician's authority for personal gain.
See Insider threat and Graft (politics)
Hyperlink
In computing, a hyperlink, or simply a link, is a digital reference to data that the user can follow or be guided to by clicking or tapping.
See Insider threat and Hyperlink
Logic bomb
A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
See Insider threat and Logic bomb
Malware
Malware (a portmanteau of malicious software)Tahir, R. (2018). Insider threat and Malware are security breaches.
See Insider threat and Malware
Mole (espionage)
In espionage jargon, a mole (also called a "penetration agent", "deep cover agent", "illegal" or "sleeper agent") is a long-term spy (espionage agent) who is recruited before having access to secret intelligence, subsequently managing to get into the target organization. Insider threat and mole (espionage) are security breaches.
See Insider threat and Mole (espionage)
Naval Criminal Investigative Service
The United States Naval Criminal Investigative Service (NCIS) is the primary investigative law enforcement agency of the U.S. Department of the Navy.
See Insider threat and Naval Criminal Investigative Service
Phishing
Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware.
See Insider threat and Phishing
Scam
A scam, or a confidence trick, is an attempt to defraud a person or group after first gaining their trust.
Shrinkage (accounting)
In accounting, shrinkage or shrink occurs when a retailer has fewer items in stock than were expected by the inventory list.
See Insider threat and Shrinkage (accounting)
Stochastic forensics
Stochastic forensics is a method to forensically reconstruct digital activity lacking artifacts, by analyzing emergent properties resulting from the stochastic nature of modern computers.
See Insider threat and Stochastic forensics
Technology specialist
An IT specialist, computer professional, or an IT professional may be.
See Insider threat and Technology specialist
Threat (computer security)
In computer security, a threat is a potential negative action or event enabled by a vulnerability that results in an unwanted impact to a computer system or application.
See Insider threat and Threat (computer security)
White paper
A white paper is a report or guide that informs readers concisely about a complex issue and presents the issuing body's philosophy on the matter.
See Insider threat and White paper
See also
Security breaches
- Agent Tesla
- Botnet
- Computer virus
- Computer worm
- Cryptojacking
- Data breach
- Data breach notification laws
- Daxin (spyware)
- Digital kidnapping
- Evil maid attack
- FluBot
- Gate crashing
- Hamza Bendelladj
- Identity theft
- Industrial espionage
- Infostealer
- Insider threat
- Keystroke logging
- List of spyware programs
- Lock picking
- Malware
- Mole (espionage)
- ODIN Intelligence
- Package pilferage
- Package theft
- Poly Network exploit
- Ramsay Malware
- Ransomware
- Rogue security software
- Safe-cracking
- Security hacker
- Spyware
- Trojan horse (computing)
- United States government security breaches
References
[1] https://en.wikipedia.org/wiki/Insider_threat
Also known as Inside job, Inside jobs, Insider Threat Management, Insider attack.