@article{1802, author = {Hongmei Chi, Clement Allen, David Angulo Rubio}, title = {Design Insider Threat Hands-on Labs}, journal = {Information Security Education Journal}, year = {2015}, volume = {2}, number = {1}, doi = {}, url = {http://www.dline.info/isej/fulltext/v2n1/5.pdf}, abstract = {Insider threat continues to be of serious concern to governmental organizations and private companies. Vulnerabilities of the digital information being shared through mobile devices and Internet clouds increases exponentially due to IT security mechanisms not being capable of controlling what is beyond company network limits. One of the solutions could include providing an effective interactive framework to train future and current Information Technology security professionals and regular employees who need to be aware of these threats in order to avoid being a victim of insider attacks. There are few hands-on labs/modules available for training current students, the future information assurance professionals. This paper will classify the different actors and vectors involved in these attacks focusing specifically on Information Technology (IT) sabotage, theft of intellectual property and insider fraud. Then, we will describe how to design virtual hands-on labs mainly to current or future technology security professionals. The training hands-on labs will enhance trainee’s knowledge and practical security skills about how to mitigate insider threat attacks. In addition, the training hands-on labs will be implemented via CyberCIEGE, an innovative video game and tool to educate fundamental concepts for insider threat.}, }