Topic 5 - Insider Threat

What is an insider threat? An insider looks like you or me, an employee, contractor, or someone who has legitimate access to a computer system. Most insiders misuse or exploit weaknesses in the system. Others, due to lack of training and awareness, can cause grave damage. To see a profile of an insider, or learn how insider threats can affect you and what you can do, read below.

Profile of an Insider

All insiders have some degree of physical or administrative access to the information system. Stress, divorce or financial problems are some examples of what might turn a “trusted” user into an insider threat.

How Does Insider Threat Affect Me

So, you’re wondering how insider threats can affect you? Take a look at these scenarios to see just how common insider threats are.

What Can I Do

Although there are security programs to prevent unauthorized access to information systems and employees undergo background investigations, certain life experiences can alter a person’s normal behavior and cause them to act illegally. Here are a few suggestions for what you can do to help in the fight against insider threat.


Back | Next

Module 2

Main Menu

Resources