Guidance

Insider misuse of systems

Created:  01 Oct 2016
Updated:  01 Oct 2016
CPNI Archive

Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

This paper is a brief summary of the types of insider cases that CPNI has examined as part of its Cyber Insiders Programme

2013008-insider-misuse_of_it_systems.pdf

PDF, 337.75KB

This file may not be suitable for users of assistive technology.

Was this guidance helpful?

We need your feedback to improve this content.

Yes No