ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™

  • ID: IF015.003
  • Created: 18th July 2024
  • Updated: 19th July 2024
  • Contributor: The ITM Team

Theft of Other Digital Assets

A subject steals other digital assets, such as monitors, hard drives, or peripherals, belonging to an organization.

Detection

ID Name Description
DT033Closed-Circuit Television

CCTV can be used to observe activity within or around a site. This control can help to detect preparation or infringement activities and record it to a video file.