The following are protective measures that you can take against an insider threat, EXCEPT FOR: Providing non-threatening and convenient ways for employees to report suspicions.Issuing universal systems access and credentials…
The following are examples of threats to critical infrastructure from malicious insider activities, EXCEPT FOR: Disruptions of essential services.Overlaps in business processes.Contamination of food or water supplies.Theft of intellectual property.
A malicious insider exploits the vulnerabilities of an entity’s security, systems, services, products, or facilities with the intent to: Resist malice.Achieve progress.Place blame.Cause harm.
What does a malicious insider require in order to exploit an organization’s vulnerabilities? Access or inside knowledge.Elimination of knowledge-related processes.Explicit and tacit knowledge.Network-enabled access controllers.
TRUE OR FALSE: Malicious insiders can be encouraged by a work environment where employees feel rushed. TrueFalse
The following are examples of threats to critical infrastructure from malicious insider activities, EXCEPT FOR: Destroying equipment and inventory.Stealing hazardous or essential materials.Developing unconventional technologies.Sabotaging control or other essential systems.