This resource is no longer available
This article in our Royal Holloway Information Security Thesis Series provides an examination of a malicious insider attack as a sequence of phases and a practical 10-step programme for mitigating the threat.
Contents include:
- Advanced intelligence-led cyber defence
- Malicious insiders
- The phases of a malicious insider attack