Insider Threat 2006
DOI: 10.1016/b978-159749048-1/50002-9
|View full text |Cite
|
Sign up to set email alerts
|

What Is There to Worry About?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Bunn & Glynn (2016) make a distinction between first-degree and second-degree critical knowledge. While the former is knowledge about the organizational assets, like for instance the location or code of the company vault, the latter is knowledge about vulnerabilities (or security holes) that are related to the organizational assets, like for instance blind spots on the closed-circuit television (CCTV) that is monitoring the vault (Cole & Ring, 2006;Nurse et al, 2014;Sarkar, 2010). Similar to access, knowledge is privileged because insiders possess the knowledge while outsiders do not possess it.…”
Section: Insidersmentioning
confidence: 99%
See 2 more Smart Citations
“…Bunn & Glynn (2016) make a distinction between first-degree and second-degree critical knowledge. While the former is knowledge about the organizational assets, like for instance the location or code of the company vault, the latter is knowledge about vulnerabilities (or security holes) that are related to the organizational assets, like for instance blind spots on the closed-circuit television (CCTV) that is monitoring the vault (Cole & Ring, 2006;Nurse et al, 2014;Sarkar, 2010). Similar to access, knowledge is privileged because insiders possess the knowledge while outsiders do not possess it.…”
Section: Insidersmentioning
confidence: 99%
“…Also individuals that obtain access or knowledge not via trust by the organization but through manipulating a trusted individual fall out of the scope of the insider concept. In contrast to Cole & Ring (2006) and Sarkar (2010) who consider individuals who are not trusted by the company like spouses, friends and social engineers (i.e. individuals that have no access to or knowledge about the organizational assets, but that manipulate an insider that has access/knowledge in order to reach the organizational assets) as insider threats, our definition limits the insider concept, and consequently the insider threat, to individuals that are trusted by the organization.…”
Section: Insidersmentioning
confidence: 99%
See 1 more Smart Citation