- Series: SEI Series in Software Engineering
- Hardcover: 432 pages
- Publisher: Addison-Wesley Professional; 1 edition (February 3, 2012)
- Language: English
- ISBN-10: 0321812573
- ISBN-13: 978-0321812575
- Product Dimensions: 7 x 1.1 x 9.2 inches
- Shipping Weight: 1.7 pounds (View shipping rates and policies)
- Average Customer Review: 12 customer reviews
- Amazon Best Sellers Rank: #404,229 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) (SEI Series in Software Engineering) 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
The Amazon Book Review
Author interviews, book reviews, editors picks, and more. Read it now
Frequently bought together
Customers who bought this item also bought
“For years, researchers at the CERT Insider Threat Center at Carnegie Mellon’s Software Engineering Institute have been collecting and studying data on real-world insider incidents. This year, they published a book cataloging the results of their research, called The CERT Guide to Insider Threats. This book is an invaluable guide to establishing effective processes for managing the risk of insider attacks, and it should be on every security professional’s wish list this year. In general, the insider threat drives home the point that perimeter defenses are no longer enough. IT organizations also need to be able to see into their internal networks to identify suspicious activity.”
-- Tom Cross, Director of Security Research at Lancope, guest writing for Forbes CIO Central
About the Author
Dawn Cappelli, CISSP, is Technical Manager of the CERT Insider Threat Center and the Enterprise Threat and Vulnerability Management Team at Carnegie Mellon University’s Software Engineering Institute (SEI). She has spent the past decade working with organizations such as the U.S. Secret Service and Department of Homeland Security in protecting the United States against insider threats. Andrew Moore is Lead Researcher in the CERT Insider Threat Center and Senior Member of Technical Staff at SEI. Randall Trzeciak is a Senior Member of Technical Staff at SEI, and Technical Team Lead for the Insider Threat Research Group at the CERT Insider Threat Center.
Top customer reviews
Although its focus on academic rigor causes it to start a little slow, the rest of the book is well worth the wait. I plan to recommend this book to my students and to my readers.
Don't just think about buying this book... DO IT NOW!!!
1: Train employees and their managers to watch for the signs of potential insider threat behavior.
2: Provide the mechanisms across the organization to report and review the activity.
3: Establish and maintain the apparatus to report potential abuse and respond to incidents when necessary.
4: Mitigate the risk before any damage is done.
The key to the entire program is the human element, and that is why defending against the insider threat is hard.
Full review on my blog site: Terebrate
For example, take chapters 1-4. Chapter 1 provides an overview and briefs you on the three types of insider IT threats (as defined by CERT). It also introduces you to the CERT Insider Threat Center and the CERT database. Chapters 2-4 then elaborate on each of the three insider threats introduced in chapter 1, with a chapter dedicated to each threat respectively. One thing to note: this book intentionally chooses to exclude national security espionage.
Chapter 5 covers vulnerabilities in software engineering, exposing a company to malicious insiders. 6 and 7 focus on mitigation, while chapter 8 is chocked full of actual examples from the CERT database. Even Chapter 9, which is advertised as a “conclusion” still has loads of information to present – mostly stuff that didn’t really fit in the other chapters. To top it all off, there are several appendices that are as much must-read material as any of the chapters in this book.
Now, it’s probably relevant to my review that I disclose that I am not in the IT industry…yet. Though I am no spring chicken, I have returned to school the last couple years to study this subject and I do hope to find employment in this field very soon. With that being said, having a book like this to help develop my understanding is invaluable. The layout and design of the book does mean that there are some subjects (even entire chapters) that may not have relevance to everyone, but considering how much of a threat insiders pose (as this book helped me to fully grasp), in my opinion this is a tool more so than a book to read. Granted, I may be quite a ways off from being in a position to implement strategies provided in this book or to even be remotely influential in any kind of threat prevention, but this book does help build a foundation of knowledge that every employee anywhere should have and understand. We’ve all heard the stories of people who try to “stick it to the man”, but what this book really excels at is developing such an awareness of the true threat that insiders pose, that you can’t help but walk away from this book trying to put yourself in the minds of any disgruntled friends/coworkers you may have.
Overall I found the book to be well written and easy to follow. The writers of this book clearly want you to take away some very important information, so they even go so far as to include highlighted Tips and Notes sections throughout the book – and not just a few! Pretty much every few pages there’s at least either a note and/or tip to digest. As a current student, I especially appreciated that this book is written similar to a textbook. Clearly, the people at the CERT threat center want their readers to actually LEARN something (many somethings in fact), versus just being entertained.
Ultimately, though this book is geared for those already embedded in the industry, it is written as an educational tool, giving it value even to those of us who don’t have a wealth of IT experience. I would absolutely recommend this book! For those just curious about how damaging insider threats can truly be, read chapter 1 and then jump to chapter 8. I guarantee after that, you’ll want to delve further into CERT!
Most recent customer reviews
is a very interesting and...Read more