LIST OF FIGURES
Figure 1: Intentional vs. Unintentional Threat
Figure 2: Percentage of Externa Influence in Foreign Theft of IP
Figure 3: Percentage of Insider Threat by Type
Figure 4: Reasons for Insider Threat Activity (adapted from CMU SEI and CPNI)
Figure 5: Insider Threat Behavior Characteristics (Adapted from research findings from the CMU SEI)
Figure 6: 10 Stages of the Insider
Figure 7: Evolution of an Insider Threat
Figure 8: Example of a Phishing Email
Figure 9: Cloud Service Models
Figure 10: Cloud Deployment Models
Figure 11: Perception of Risk for Various Data Environments
Figure 12: Key Components of an Insider Threat Program
Figure 13: 10 Steps to an Insider Threat Program
Get Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.