Insider Threat Study: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
|||
Line 20: | Line 20: | ||
==Additional Notes and Highlights== | ==Additional Notes and Highlights== | ||
{| class="wikitable sortable" border="1" | |||
|+ Sortable table | |||
|- | |||
! Alphabetic !! Numeric !! Date !! class="unsortable" | Unsortable | |||
|- | |||
| d || 20 || 2008-11-24 || This | |||
|- | |||
| b || 8 || 2004-03-01 || column | |||
|- | |||
| a || 6 || 1979-07-23 || cannot | |||
|- | |||
| c || 4 || 1492-12-08 || be | |||
|- | |||
| e || 0 || 1601-08-13 || sorted. | |||
|} |
Revision as of 11:21, 26 July 2010
Full Title of Reference
Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector
Full Citation
United States Secret Service, Computer Emergency Response Team (2004): Insider Threat Study. Illicit Cyber Activity in the Banking and Finance Sector. U.S. Government. Online Paper. Web
Categorization
- Resource by Type: US Government Reports and Documents
Key Words
Synopsis
Additional Notes and Highlights
Alphabetic | Numeric | Date | Unsortable |
---|---|---|---|
d | 20 | 2008-11-24 | This |
b | 8 | 2004-03-01 | column |
a | 6 | 1979-07-23 | cannot |
c | 4 | 1492-12-08 | be |
e | 0 | 1601-08-13 | sorted. |