Deriving Candidate Technical Controls and Indicators of Insider Attack from Socio-Technical Models and Data Technical Note Published

This paper demonstrates how to extract and map technical information from previous insider crimes.

What's on Your Mind...