Index
A
Acceptable use policies for sabotage, 42, 48
Acceptable workplace behavior, 168
Access and access controls
description, 179
fraud, 125
separation of duties and least privilege, 178–181
system change controls, 193
Access paths
Access rights management, 284
Accomplices
information collection on, 328
theft of IP, 86
Accountability of third-party vendors, 57
Accounts and account management
expiration dates, 234
organized crime, 118
policies and practices, 174–177
terminated employees, ...
Get The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.