Index

A

Acceptable use policies for sabotage, 42, 48

Acceptable workplace behavior, 168

Access and access controls

Ambitious Leader model, 8081

description, 179

erosion of, 71, 189

fraud, 125

Internet underground, 291292

logs, 172173

remote, 9092, 200201

SDLC, 132133

separation of duties and least privilege, 178181

source code, 131, 142

system change controls, 193

after termination, 203206

Access paths

eliminating, 5052

sabotage, 4045

Access rights management, 284

Accomplices

fraud, 103, 121, 269

information collection on, 328

theft of IP, 86

Accountability of third-party vendors, 57

Accounts and account management

expiration dates, 234

organized crime, 118

policies and practices, 174177

for sabotage, 45, 52

terminated employees, ...

Get The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.