AOH :: IS1741.HTM

Report Helps Define, Detect Insider Threats

Report Helps Define, Detect Insider Threats
Report Helps Define, Detect Insider Threats

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

Content-Transfer-Encoding: QUOTED-PRINTABLE

By Katie Packard
AFCEA Signal
February 17, 2009

A U.S. Defense Department-sponsored organization has issued a report 
that illustrates how vulnerable an operational information technology 
system can be to threats from the inside of an organization. The 
Information Assurance Technology Analysis Center (IATAC) published The 
Insider Threat to Information Systems: A State of the Art Report to help 
define what constitutes an insider attack and how government, industry 
and academia are addressing these threats. The report also presents best 
practices government and industry can use to mitigate potential attacks.

IATAC is one of 10 information analysis centers managed by the Defense 
Technical Information Center, which serves the Defense Department 
community as a central resource for department- and government-funded 
scientific, technical, engineering and business research. IATAC provides 
the Defense Department with emerging scientific and technical data in 
support of information assurance and information operations.

Gene Tyler, IATAC=E2=80=99s director, shares that IATAC publishes approximately 
one state-of-the-art report (SOAR) each year. =E2=80=9CBecause IATAC handles 
information assurance and cybersecurity-type issues, our steering 
commission suggested insider threats would be a good topic to research=E2=80=9D 
for a new SOAR, he says.


Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

Best Selling Security Books and More! 


Site design & layout copyright © 1986-2015 CodeGods