ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™

  • ID: AF012.003
  • Created: 25th May 2024
  • Updated: 14th June 2024
  • Contributor: The ITM Team

Hidden File System

A subject may use their own abstracted file system, separate from the standard file system. In doing so, insiders can hide the presence of malicious components and file input/output from security tools.