Goodreads helps you keep track of books you want to read.
Start by marking “The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)” as Want to Read:
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)
Enlarge cover
Rate this book
Clear rating
Open Preview

The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)

3.75  ·  Rating details ·  24 Ratings  ·  4 Reviews
Since 2001, the CERT(R) Insider Threat Center at Carnegie Mellon University's Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT(R) Guide to Insider Threats describes CERT's findings in practical terms, offering speci ...more
Hardcover, 389 pages
Published February 3rd 2012 by Addison-Wesley Professional (first published January 1st 2012)
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about The CERT Guide to Insider Threats, please sign up.

Be the first to ask a question about The CERT Guide to Insider Threats

Community Reviews

(showing 1-10)
Rating details
Sort: Default
|
Filter
Ivars Svekris
Aug 06, 2016 rated it really liked it
Bit dated, but still useful.
Rick Howard
Dec 21, 2012 rated it liked it
Executive Summary

The authors have reviewed more than 700 cases of insider threat attacks and developed a comprehensive list of mitigation controls that might have prevented them. The book is not very well organized, but the content represents the authoritative source on precursor behavior that may illuminate potential insider attacks. In that regard, it is a must-read for cyber security professionals. What is clear from reading the book is that there is no technical solution that will prevent in
...more
Jorge Rodriguez
Mar 25, 2013 rated it really liked it
The book serves the purpose of providing data and statistics about the insider attack, and the behaviour we can expect from insiders. Makes good classifications of the cases it contains and educates the reader on the different kinds of insider attacks that he can expect. In my opinion the technical chapter could be a lot more technical, but helps demonstrating that easy to use, widespread tools can make a big difference. It can be a little repetitive with the cases and with the information, but ...more
Vasil Kolev
Jul 07, 2012 rated it it was ok
Shelves: tech
The book is not good. It contains a lot of fear mongering, some ideas, but seems targeted mostly to clueless managers.
Michael Gordover
rated it it was amazing
Jul 18, 2016
Vhenry
rated it really liked it
Jul 05, 2014
Pete Teoh
rated it really liked it
Feb 04, 2015
QueMstr
rated it liked it
Dec 15, 2014
Kate
rated it really liked it
Dec 25, 2013
James Voorhees
rated it it was amazing
Feb 15, 2016
« previous 1 3 next »
There are no discussion topics on this book yet. Be the first to start one »

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »