CHAPTER 13

THE DANGEROUS INFORMATION TECHNOLOGY INSIDER: PSYCHOLOGICAL CHARACTERISTICS AND CAREER PATTERNS1

Jerrold M. Post

13.1 COMPUTER INFORMATION TECHNOLOGY INSIDERS

13.2 PSYCHOLOGICAL CHARACTERISTICS OF INFORMATION TECHNOLOGY SPECIALISTS

13.3 CHARACTERISTICS OF THE DANGEROUS COMPUTER INFORMATION TECHNOLOGY INSIDER (CITI)

13.4 ESCALATING PATHWAY TO MAJOR COMPUTER CRIME

13.5 STRESS AND ATTACKS ON COMPUTER SYSTEMS

13.6 TYPOLOGY OF COMPUTER CRIME PERPETRATORS

13.7 CONCLUSION AND IMPLICATIONS

13.8 NOTE

13.1 COMPUTER INFORMATION TECHNOLOGY INSIDERS.

In the complex world of information technology, it is people who create the systems and it is people with authorized access, the computer information technology insiders (CITIs), who represent the greatest threat to these systems.

Computer security experts have developed ever more sophisticated technological solutions to protect sensitive information and combat computer fraud. But no matter how sensitive the computer intrusion detection devices, no matter how impenetrable the firewalls, they will be of no avail in countering the malicious insider.

In considering the population of authorized insiders, it is clear just how broad and variegated this category is and that the line between insiders and outsiders is often blurred.

CITIs include:

  • Staff employees
  • Contractors and consultants
  • Partners and customers
  • Temporary employees (temps)
    • Short term
    • Long term
  • Former employees
  • Employees on notice of dismissal

There is an interesting paradox ...

Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.