1. Network vulnerability scanning, http://searchsecurity.techtarget.com/definition/vulnerability-scanning
2. 6 free network vulnerability scanners http://www.networkworld.com/article/2176429/security/security-6-free-network-vulnerability-scanners.html
3. Jeremy, Understanding the “Insider Threat” https://cloudtweaks.com/2015/01/4-different-types-attacks-understanding-insider-threat/
4. Understanding Insider Threat: A Framework for Characterising Attacks, http://ieeexplore.ieee.org/document/6957307/?reload=true
5. Jason R.C. Nurse, Oliver Buckley, Philip A. Legg, Michael Goldsmith, Sadie Creese, Gordon R.T. Wright, Monica Whitty, Understanding Insider Threat: A Framework for Characterising Attacks, 2014 IEEE Security and Privacy Workshops (2014) http://www.ieee-security.org/TC/SPW2014/papers/5103a214.PDF