Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Dawn M. Cappelli is active.

Publication


Featured researches published by Dawn M. Cappelli.


Insider Attack and Cyber Security | 2008

The “Big Picture” of Insider IT Sabotage Across U.S. Critical Infrastructures

Andrew P. Moore; Dawn M. Cappelli; Randall F. Trzeciak

A study conducted by the U.S. Secret Service and the Carnegie Mellon University Software Engineering Institute CERT Program analyzed 150 insider cyber crimes across U.S. critical infrastructure sectors. Follow-up work by CERT involved detailed group modeling and analysis of 54 cases of insider IT sabotage out of the 150 total cases. Insider IT sabotage includes incidents in which the insider’s primary goal was to sabotage some aspect of the organization or direct specific harm toward an individual. This paper describes seven general observations about insider IT sabotage based on our empirical data and study findings. We describe a System Dynamics model of the insider IT sabotage problem that elaborates complex interactions in the domain and unintended consequences of organizational policies, practices, technology, and culture on insider behavior. We describe the structure of an education and awareness workshop on insider IT sabotage that incorporates the previously mentioned artifacts as well as an interactive instructional case.


ieee symposium on security and privacy | 2008

Combating the Insider Cyber Threat

Frank L. Greitzer; Andrew P. Moore; Dawn M. Cappelli; Dee H. Andrews; Lynn A. Carroll; Thomas D. Hull

The penetration of US national security by foreign agents as well as American citizens is a historical and current reality thats a persistent and increasing phenomenon. Surveys, such as the e-crime watch survey, reveal that current or former employees and contractors are the second greatest cybersecurity threat, exceeded only by hackers, and that the number of security incidents has increased geometrically in recent years. The insider threat is manifested when human behavior departs from compliance with established policies, regardless of whether it results from malice or a disregard for security policies. In this article, we focus on the need for effective training to raise staff awareness about insider threats and the need for organizations to adopt a more effective approach to identifying potential risks and then taking proactive steps to mitigate them.


Proceedings of the 2010 ACM workshop on Insider threats | 2010

Using empirical insider threat case data to design a mitigation strategy

Dawn M. Cappelli

1. Understanding the Complexity of Insider Threat According to research by the CERT Program (CERT) in the Software Engineering Institute at Carnegie Mellon University, approximately half of all organizat1ons experience at least one electronic crime perpetrated by an insider each year. These crimes include theft, sabotage, fraud, and espionage. CERT began researching this problem in 2001. It has compiled a database of more than 500 criminal cases in which current or former employees, contractors, or business partners abused the trust and access associated with their positions. As part of its research, CERT interviewed many victim organizations. It also interviewed some perpetrators themselves, complementing a wealth of case data with first-hand insights into the methods and motivations behind these crimes.


Archive | 2005

Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector

Marisa Reddy Randazzo; Michelle Keeney; Eileen Kowalski; Dawn M. Cappelli; Andrew P. Moore


Archive | 2005

Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors

Michelle Keeney; Eileen Kowalski; Dawn M. Cappelli; Andrew P. Moore; Timothy J. Shimeall; Stephanie Rogers


Archive | 2012

The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes

Dawn M. Cappelli; Andrew P. Moore; Randall F. Trzeciak


Archive | 2006

Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis

Stephen R. Band; Dawn M. Cappelli; Lynn F. Fischer; Andrew P. Moore; Eric D. Shaw; Randall F. Trzeciak


Archive | 2008

Insider Threat Study: Illicit Cyber Activity in the Government Sector

Eileen Kowalski; Tara Conway; Susan Keverline; Megan Williams; Dawn M. Cappelli; Bradford J. Willke; Andrew P. Moore


Archive | 2008

Insider Threat Study: Illicit Cyber Activity in the Information Technology and Telecommunications Sector

Eileen Kowalski; Dawn M. Cappelli; Andrew P. Moore


JoWUA | 2011

A Preliminary Model of Insider Theft of Intellectual Property

Andrew P. Moore; Dawn M. Cappelli; Thomas C. Caron; Eric D. Shaw; Derrick Spooner; Randall F. Trzeciak

Collaboration


Dive into the Dawn M. Cappelli's collaboration.

Top Co-Authors

Avatar

Andrew P. Moore

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Randall F. Trzeciak

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Timothy J. Shimeall

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Eileen Kowalski

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Akash G. Desai

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Elise A. Weaver

Worcester Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar

Matthew Collins

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Michelle Keeney

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Stephanie Rogers

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Casey Dunlevy

Carnegie Mellon University

View shared research outputs
Researchain Logo
Decentralizing Knowledge