Collaboration of
several parties or identities in order to misuse a system. Examples include
creation of a false identity by one party and entry of that identity into a
computer database by a second party, provision of attack software by an
outsider to an insider who is participating in an information theft,
partitioning of elements of an attack into multiple parts for coordinated
execution so as to conceal the fact of or source of an attack, and the
providing of alibis by one party to another when the collaborated in a
crime.
Complexity: Collaborative misuse has not been extensively analyzed
mathematically, but limited analysis has been done from a standpoint of
identifying effects of collaborations on leakage and corruption in POset
networks and results indicate that detecting or limiting collaborative
effects is not highly complex if the individual attacks are detectable.
fc@red.a.net