58.9 F
Washington D.C.
Friday, October 7, 2022
spot_img

The Snowden Fallout: Two Years Later

The Snowden Fallout: Two Years Later Homeland Security TodayFormer National Security Agency (NSA) subcontractor Edward Snowden said recently he is willing to stand trial in the US for revealing classified information about NSA surveillance activities. Ever since he released the first classified documents in June 2013, shock waves have continued to reverberate throughout the federal IT sector. In the wake of Snowden’s insider breach, many organizations suddenly awoke to the notion that insiders — both employees and contractors — did not always have the best intentions.

Trusted insiders, especially those with elevated privileges, are often given access to tremendous amounts of sensitive information, regardless of whether they actually need that information to perform their jobs. A 2014 Ponemon/Raytheon study on insider threats reported 73 percent of privileged users believed they were entitled to access all the information they had the ability to view, and that 65 percent of them accessed sensitive or confidential data out of curiosity.

Elevated access privileges also often include the ability to make changes to systems and network configurations. The Ponemon/Raytheon survey pointed out that 54 percent of the organizations who responded regularly assign privileges to individuals that go beyond their role or responsibility. These excess access rights present a clear and present danger.

Read the complete report in the April/May 2015 issue of Homeland Security Today.

Homeland Security Todayhttp://www.hstoday.us
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.

Related Articles

- Advertisement -

Latest Articles