Module Description: This module describes the insider threats facing an organization and analyzes the complex nature of insider threats. It also describes how organizations and individuals can secure themselves against this threat and prepare to respond if an attack occurs.
Prerequisites: Students taking this course should have first completed the Physical Security Systems Module to understand the basics of multi-path analysis and the Adversary Sequence Diagram as it relates to outsiders attempting to gain access to materials in a facility.
Learning Objectives: By the end of this module students will have an understanding of who an insider is and the types of threats they pose to an organization. Students will also have basic knowledge regarding what motivates an insider to commit an attack and how to combat such attacks. Prominent historic cases of insider attacks will assist the student in visualizing these attacks in practice.
Outline: This module consists of the following sections:
Each section contains reading material, videos, and reference materials. The reading material includes a brief discussion of the subject matter, and the videos explore the subject in further detail. The student should complete the reading material and then watch the videos if they wish to have additional information and a more in-depth explanation of the subject matter.
For the best viewing experience on a computer, videos in this module can be streamed full screen on YouTube by pressing the "Full Screen" icon to the bottom right of embedded YouTube videos. All YouTube videos have English subtitles available (CC button).
A special thanks to Cheryl Landry for her help in producing this module.
Mohammed Hawila, Sunil Chirayath, and William Charlton, "Nuclear Security Risk Evaluation Using Adversary Pathway Analysis Methodology for an Insider-Outsider Collusion Scenario," 56th annual INMM meeting, Indian Wells, California. July 12-18, 2015.
The development for this course was sponsored by the US Department of State's Partnership for Nuclear Security.