ABSTRACT

While much of the world focuses on hackers and malicious forces attacking corporate information systems, many people forget that it is the insider that most frequently does damage to computer systems, cripples applications, and steals data. This chapter examines computer usage and access issues of insiders, including the types of crimes that insiders commit using their employer's computers and networks. It covers importance of specific policies covering telecommuting, and examines potential issues with employees using personally owned computers to remotely access an organization's central systems. The chapter covers the loss and theft of mobile computing devices, and information needed to report the theft of mobile computing devices. It explains the importance of monitoring what information technology staffs are doing on company systems, password management problems with insiders, and potential problems in configuring privately owned computers to access company systems.