The insider attack problem nature and scope -- Reflections on the insider threat -- The "big picture" of insider IT sabotage across U.S. critical infrastructures -- Data theft : a prototypical insider threat -- A survey of insider attack detection research -- Naive Bayes as a masquerade detector : addressing a chronic failure -- Towards a virtualization-enabled framework for information traceability (VFIT) -- Reconfigurable tamper-resistant hardware support against insider threats : the trusted ILLIAC approach -- Surviving insider attacks : a call for system experiments -- Preventative directions for insider threat mitigation via access control -- Taking stock and looking forward: an outsider's perspective on the insider threat -- Research challenges for fighting insider threat in the financial services industry -- Hard problems and research challenges concluding remarks
Notes
"Proceedings of the first Workshop on Insider Attack and Cyber Security held in Washington DC in June 2007"--Pref