Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | , |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Upper Saddle River, NJ
Addison-Wesley
2012
|
Schriftenreihe: | The SEI series in software engineering
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780132906050/?ar |
Zusammenfassung: | Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University's Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider Threats describes CERT's findings in practical terms, offering specific guidance and countermeasures that can be immediately applied by executives, managers, security officers, and operational staff within any private, government, or military organization. The authors systematically address attacks by all types of malicious insiders, including current and former employees, contractors, business partners, outsourcers, and even cloud-computing vendors. They cover all major types of insider cyber crime: IT sabotage, intellectual property theft, and fraud. For each, they present a crime profile describing how the crime tends to evolve over time, as well as motivations, attack methods, organizational issues, and precursor warnings that could have helped the organization prevent the incident or detect it earlier. Beyond identifying crucial patterns of suspicious behavior, the authors present concrete defensive measures for protecting both systems and data. This book also conveys the big picture of the insider threat problem over time: the complex interactions and unintended consequences of existing policies, practices, technology, insider mindsets, and organizational culture. Most important, it offers actionable recommendations for the entire organization, from executive management and board members to IT, data owners, HR, and legal departments. With this book, you will find out how to Identify hidden signs of insider IT sabotage, theft of sensitive information, and fraud Recognize insider threats throughout the software development life cycle Use advanced threat controls to resist attacks by both technical and nontechnical insiders Increase the effectiveness of existing technical security tools by enhancing rules, configurations, and associated business processes Prepare for unusual insider attacks, including attacks linked to organized crime or the Internet underground By implementing this book's security practices, you will be incorporating protection mechanisms designed to resist the vast majority of malicious insider attacks. |
Beschreibung: | Includes bibliographical references and index. - Print version record |
Umfang: | 1 online resource (xxxv, 389 pages) illustrations |
ISBN: | 9780132906050 0132906058 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047425067 | ||
003 | DE-627-1 | ||
005 | 20240228114935.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2012 xx |||||o 00| ||eng c | ||
020 | |a 9780132906050 |9 978-0-13-290605-0 | ||
020 | |a 0132906058 |9 0-13-290605-8 | ||
035 | |a (DE-627-1)047425067 | ||
035 | |a (DE-599)KEP047425067 | ||
035 | |a (ORHE)9780132906050 | ||
035 | |a (DE-627-1)047425067 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 658.4/78 |2 23 | |
100 | 1 | |a Cappelli, Dawn |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The CERT guide to insider threats |b how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) |c Dawn Cappelli, Andrew Moore, Randall Trzeciak |
246 | 3 | 3 | |a How to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) |
264 | 1 | |a Upper Saddle River, NJ |b Addison-Wesley |c 2012 | |
300 | |a 1 online resource (xxxv, 389 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a The SEI series in software engineering | |
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University's Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider Threats describes CERT's findings in practical terms, offering specific guidance and countermeasures that can be immediately applied by executives, managers, security officers, and operational staff within any private, government, or military organization. The authors systematically address attacks by all types of malicious insiders, including current and former employees, contractors, business partners, outsourcers, and even cloud-computing vendors. They cover all major types of insider cyber crime: IT sabotage, intellectual property theft, and fraud. For each, they present a crime profile describing how the crime tends to evolve over time, as well as motivations, attack methods, organizational issues, and precursor warnings that could have helped the organization prevent the incident or detect it earlier. Beyond identifying crucial patterns of suspicious behavior, the authors present concrete defensive measures for protecting both systems and data. This book also conveys the big picture of the insider threat problem over time: the complex interactions and unintended consequences of existing policies, practices, technology, insider mindsets, and organizational culture. Most important, it offers actionable recommendations for the entire organization, from executive management and board members to IT, data owners, HR, and legal departments. With this book, you will find out how to Identify hidden signs of insider IT sabotage, theft of sensitive information, and fraud Recognize insider threats throughout the software development life cycle Use advanced threat controls to resist attacks by both technical and nontechnical insiders Increase the effectiveness of existing technical security tools by enhancing rules, configurations, and associated business processes Prepare for unusual insider attacks, including attacks linked to organized crime or the Internet underground By implementing this book's security practices, you will be incorporating protection mechanisms designed to resist the vast majority of malicious insider attacks. | ||
650 | 0 | |a Computer crimes |x Prevention | |
650 | 0 | |a Computer security | |
650 | 0 | |a Employee crimes |x Prevention | |
650 | 0 | |a Information technology |x Security measures | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Data protection | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Technologie de l'information ; Sécurité ; Mesures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer crimes ; Prevention | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Data protection | |
650 | 4 | |a Employee crimes ; Prevention | |
650 | 4 | |a Information technology ; Security measures | |
650 | 4 | |a Social Welfare & Social Work | |
650 | 4 | |a Social Sciences | |
650 | 4 | |a Criminology, Penology & Juvenile Delinquency | |
700 | 1 | |a Moore, Andrew |e MitwirkendeR |4 ctb | |
700 | 1 | |a Trzeciak, Randall |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9780321812575 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780321812575 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780132906050/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047425067 |
---|---|
_version_ | 1833357110561210368 |
adam_text | |
any_adam_object | |
author | Cappelli, Dawn |
author2 | Moore, Andrew Trzeciak, Randall |
author2_role | ctb ctb |
author2_variant | a m am r t rt |
author_facet | Cappelli, Dawn Moore, Andrew Trzeciak, Randall |
author_role | aut |
author_sort | Cappelli, Dawn |
author_variant | d c dc |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047425067 (DE-599)KEP047425067 (ORHE)9780132906050 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04926cam a22006492c 4500</leader><controlfield tag="001">ZDB-30-ORH-047425067</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114935.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2012 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780132906050</subfield><subfield code="9">978-0-13-290605-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0132906058</subfield><subfield code="9">0-13-290605-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047425067</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047425067</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780132906050</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047425067</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cappelli, Dawn</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The CERT guide to insider threats</subfield><subfield code="b">how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)</subfield><subfield code="c">Dawn Cappelli, Andrew Moore, Randall Trzeciak</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">How to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, NJ</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxxv, 389 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The SEI series in software engineering</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University's Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider Threats describes CERT's findings in practical terms, offering specific guidance and countermeasures that can be immediately applied by executives, managers, security officers, and operational staff within any private, government, or military organization. The authors systematically address attacks by all types of malicious insiders, including current and former employees, contractors, business partners, outsourcers, and even cloud-computing vendors. They cover all major types of insider cyber crime: IT sabotage, intellectual property theft, and fraud. For each, they present a crime profile describing how the crime tends to evolve over time, as well as motivations, attack methods, organizational issues, and precursor warnings that could have helped the organization prevent the incident or detect it earlier. Beyond identifying crucial patterns of suspicious behavior, the authors present concrete defensive measures for protecting both systems and data. This book also conveys the big picture of the insider threat problem over time: the complex interactions and unintended consequences of existing policies, practices, technology, insider mindsets, and organizational culture. Most important, it offers actionable recommendations for the entire organization, from executive management and board members to IT, data owners, HR, and legal departments. With this book, you will find out how to Identify hidden signs of insider IT sabotage, theft of sensitive information, and fraud Recognize insider threats throughout the software development life cycle Use advanced threat controls to resist attacks by both technical and nontechnical insiders Increase the effectiveness of existing technical security tools by enhancing rules, configurations, and associated business processes Prepare for unusual insider attacks, including attacks linked to organized crime or the Internet underground By implementing this book's security practices, you will be incorporating protection mechanisms designed to resist the vast majority of malicious insider attacks.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Employee crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes ; Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Employee crimes ; Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social Welfare & Social Work</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social Sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminology, Penology & Juvenile Delinquency</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Moore, Andrew</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Trzeciak, Randall</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780321812575</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780321812575</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780132906050/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047425067 |
illustrated | Illustrated |
indexdate | 2025-05-28T09:46:29Z |
institution | BVB |
isbn | 9780132906050 0132906058 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (xxxv, 389 pages) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Addison-Wesley |
record_format | marc |
series2 | The SEI series in software engineering |
spelling | Cappelli, Dawn VerfasserIn aut The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) Dawn Cappelli, Andrew Moore, Randall Trzeciak How to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) Upper Saddle River, NJ Addison-Wesley 2012 1 online resource (xxxv, 389 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The SEI series in software engineering Includes bibliographical references and index. - Print version record Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University's Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider Threats describes CERT's findings in practical terms, offering specific guidance and countermeasures that can be immediately applied by executives, managers, security officers, and operational staff within any private, government, or military organization. The authors systematically address attacks by all types of malicious insiders, including current and former employees, contractors, business partners, outsourcers, and even cloud-computing vendors. They cover all major types of insider cyber crime: IT sabotage, intellectual property theft, and fraud. For each, they present a crime profile describing how the crime tends to evolve over time, as well as motivations, attack methods, organizational issues, and precursor warnings that could have helped the organization prevent the incident or detect it earlier. Beyond identifying crucial patterns of suspicious behavior, the authors present concrete defensive measures for protecting both systems and data. This book also conveys the big picture of the insider threat problem over time: the complex interactions and unintended consequences of existing policies, practices, technology, insider mindsets, and organizational culture. Most important, it offers actionable recommendations for the entire organization, from executive management and board members to IT, data owners, HR, and legal departments. With this book, you will find out how to Identify hidden signs of insider IT sabotage, theft of sensitive information, and fraud Recognize insider threats throughout the software development life cycle Use advanced threat controls to resist attacks by both technical and nontechnical insiders Increase the effectiveness of existing technical security tools by enhancing rules, configurations, and associated business processes Prepare for unusual insider attacks, including attacks linked to organized crime or the Internet underground By implementing this book's security practices, you will be incorporating protection mechanisms designed to resist the vast majority of malicious insider attacks. Computer crimes Prevention Computer security Employee crimes Prevention Information technology Security measures Computer networks Security measures Data protection Sécurité informatique Technologie de l'information ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Computer crimes ; Prevention Computer networks ; Security measures Employee crimes ; Prevention Information technology ; Security measures Social Welfare & Social Work Social Sciences Criminology, Penology & Juvenile Delinquency Moore, Andrew MitwirkendeR ctb Trzeciak, Randall MitwirkendeR ctb 9780321812575 Erscheint auch als Druck-Ausgabe 9780321812575 |
spellingShingle | Cappelli, Dawn The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) Computer crimes Prevention Computer security Employee crimes Prevention Information technology Security measures Computer networks Security measures Data protection Sécurité informatique Technologie de l'information ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Computer crimes ; Prevention Computer networks ; Security measures Employee crimes ; Prevention Information technology ; Security measures Social Welfare & Social Work Social Sciences Criminology, Penology & Juvenile Delinquency |
title | The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) |
title_alt | How to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) |
title_auth | The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) |
title_exact_search | The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) |
title_full | The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) Dawn Cappelli, Andrew Moore, Randall Trzeciak |
title_fullStr | The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) Dawn Cappelli, Andrew Moore, Randall Trzeciak |
title_full_unstemmed | The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) Dawn Cappelli, Andrew Moore, Randall Trzeciak |
title_short | The CERT guide to insider threats |
title_sort | cert guide to insider threats how to prevent detect and respond to information technology crimes theft sabotage fraud |
title_sub | how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) |
topic | Computer crimes Prevention Computer security Employee crimes Prevention Information technology Security measures Computer networks Security measures Data protection Sécurité informatique Technologie de l'information ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Computer crimes ; Prevention Computer networks ; Security measures Employee crimes ; Prevention Information technology ; Security measures Social Welfare & Social Work Social Sciences Criminology, Penology & Juvenile Delinquency |
topic_facet | Computer crimes Prevention Computer security Employee crimes Prevention Information technology Security measures Computer networks Security measures Data protection Sécurité informatique Technologie de l'information ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Computer crimes ; Prevention Computer networks ; Security measures Employee crimes ; Prevention Information technology ; Security measures Social Welfare & Social Work Social Sciences Criminology, Penology & Juvenile Delinquency |
work_keys_str_mv | AT cappellidawn thecertguidetoinsiderthreatshowtopreventdetectandrespondtoinformationtechnologycrimestheftsabotagefraud AT mooreandrew thecertguidetoinsiderthreatshowtopreventdetectandrespondtoinformationtechnologycrimestheftsabotagefraud AT trzeciakrandall thecertguidetoinsiderthreatshowtopreventdetectandrespondtoinformationtechnologycrimestheftsabotagefraud AT cappellidawn howtopreventdetectandrespondtoinformationtechnologycrimestheftsabotagefraud AT mooreandrew howtopreventdetectandrespondtoinformationtechnologycrimestheftsabotagefraud AT trzeciakrandall howtopreventdetectandrespondtoinformationtechnologycrimestheftsabotagefraud AT cappellidawn certguidetoinsiderthreatshowtopreventdetectandrespondtoinformationtechnologycrimestheftsabotagefraud AT mooreandrew certguidetoinsiderthreatshowtopreventdetectandrespondtoinformationtechnologycrimestheftsabotagefraud AT trzeciakrandall certguidetoinsiderthreatshowtopreventdetectandrespondtoinformationtechnologycrimestheftsabotagefraud |