Dick Brackney

Learn More
insiders (an analyst, application administrator, and system administrator), measuring timeliness This paper summarizes a collaborative, six and accuracy of detection. month ARDA NRRC 1 challenge workshop to characterize and create analysis methods to counter sophisticated malicious insiders in the 1. The Threat: Malicious Insiders United States Intelligence(More)
Panel Theme One of the most critical problems facing the information security community is the threat of a malicious insider abusing his computer privileges to modify, remove, or prevent access to an organization's data. An insider is considered trusted (at least implicitly) by his organization because he is granted access to its computing environment.(More)
  • 1