CHAPTER 13
THE DANGEROUS INFORMATION TECHNOLOGY INSIDER: PSYCHOLOGICAL CHARACTERISTICS AND CAREER PATTERNS1
Jerrold M. Post
13.1 COMPUTER INFORMATION TECHNOLOGY INSIDERS
13.2 PSYCHOLOGICAL CHARACTERISTICS OF INFORMATION TECHNOLOGY SPECIALISTS
13.3 CHARACTERISTICS OF THE DANGEROUS COMPUTER INFORMATION TECHNOLOGY INSIDER (CITI)
13.4 ESCALATING PATHWAY TO MAJOR COMPUTER CRIME
13.5 STRESS AND ATTACKS ON COMPUTER SYSTEMS
13.6 TYPOLOGY OF COMPUTER CRIME PERPETRATORS
13.7 CONCLUSION AND IMPLICATIONS
13.1 COMPUTER INFORMATION TECHNOLOGY INSIDERS.
In the complex world of information technology, it is people who create the systems and it is people with authorized access, the computer information technology insiders (CITIs), who represent the greatest threat to these systems.
Computer security experts have developed ever more sophisticated technological solutions to protect sensitive information and combat computer fraud. But no matter how sensitive the computer intrusion detection devices, no matter how impenetrable the firewalls, they will be of no avail in countering the malicious insider.
In considering the population of authorized insiders, it is clear just how broad and variegated this category is and that the line between insiders and outsiders is often blurred.
CITIs include:
- Staff employees
- Contractors and consultants
- Partners and customers
- Temporary employees (temps)
- Short term
- Long term
- Former employees
- Employees on notice of dismissal
There is an interesting paradox ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.