Preview

Snowden's Case Summary

Good Essays
Open Document
Open Document
520 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Snowden's Case Summary
The two most damaging leaks of classified and defense information are a contrast of each other, both forced many information security changes within the US Government. As Manning’s case failed to provide indicators and highlighted insufficient security measures dating back to 2010. Snowden’s case provided indicator of possible insider threat activity and Snowden had to bypass security protocols to acquire the information. Both cases resulted in changes to some physical security changes but many changes and improvements in information security protocols and procedures. The Department of Defense no longer allows the use of thumb drives on individual workstations (Toxen, 2014). The IT Security specialist have either locked down the USB drives on workstations or are immediately notified if something is plugged into one. The same alerts and protocols exist for the ability to copy and burn CD-ROMs from systems that process classified information (Toxen, 2014). The security protocols for those select few that have the ability to download to removable media is now tightly enforced. Procedures mandate the creation of system logs and it may be necessary to have two- person integrity to verify the information on the media (Toxen, 2014). During Manning’s time, the Personnel Security Clearance backlog was astounding and a typical investigation took 189 days to complete. By 2012, a typical investigation took only 44 days to complete as the government moved to …show more content…
Some of these changes were costly and out of the realm of possibility for small businesses. However, many of the changes all business can easily apply to their organizations. With a defense in depth approach against insider threats, businesses can apply measures to protect their data and

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    Small businesses, all organizations should begin investing in new technology to protect their databases and information. Horton’s article goes over multiple different options to avoid cyber-intrusions. For example “layering” encryption and tokenization, updated POS systems, and contracted penetration tests. By focusing on these three areas of a company’s information security infrastructure, you…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Isc363 Phase 3

    • 1899 Words
    • 8 Pages

    The level of security can determine the rise and fall of any organization, no matter how big or small the company may seem, so mitigating risk should always be the number one priority. Risk mitigation can be define as the process of implementing any form strategic actions that will reduce the level of threats that may cause financial hardship towards the organization. In addition, risk mitigation tracks, identify and evaluation all form of risk, including new and old. The focus of risk mitigation is to assist the organization’s department of security administration with identifying a list of potential problems that…

    • 1899 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The Snowden Affair Dbq

    • 1009 Words
    • 5 Pages

    The set of documents I will be reviewing are documents 118, 1, 4, and 26 regarding The Snowden Affair. The Snowden Affair is about a national security controversy that had to do with the National Security Agency (NSA) and its undisclosed surveillance of communications of American citizens under the Foreign Intelligence Surveillance Act (FISA). The information was leaked by Eduard Snowden, a former NSA agent and was published by a British newspaper, The Guardian. The Guardian revealed the NSA’s surveillance operations which included the archiving and tracking of vast amounts of data regarding use of electronic devices of U.S. citizens U.S. citizens and any foreign communications. The data revealed that Internet traffic and…

    • 1009 Words
    • 5 Pages
    Good Essays
  • Good Essays

    When an organization uses and relies on computer systems and information technology to assist in running their company(s) and also uses these resources to store important, personal information about clients, customers, employees, and the organization itself, it is important to have the adequate security protection in place to prevent this information from being compromised. The following summary will discuss how IBM prevents security breaches by using technology to reduce the rampant crime committed against them.…

    • 555 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nearly three years ago, in 2013, Edward Snowden – a former American National Security Agency (N.S.A.) contractor – leaked anywhere from a hundred to two hundred thousand classified documents, that proved the existence of massive global surveillance, including of American citizens as well as top world leaders, run by the USA with the active cooperation of many allied governments as well as telecommunication and technology companies.…

    • 694 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Edward Snowden Argument

    • 1168 Words
    • 5 Pages

    Edward Snowden was a hot topic in the news in 2013 after he released classified information from the National Security Agency (NSA) to the media. This leak contained information about global surveillance performed by the United States, which involved monitoring email, tracking cell phones, and logging phone calls. Not only did this action force him into asylum overseas to avoid arrest, but it ultimately caused an uproar in the media and amongst the American public. The controversy surrounding Snowden involves the rights of the public vs. the surveillance programs performed by the U.S. While many condemn Snowden for betraying the national security of his country, many applaud him for exposing the…

    • 1168 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Edward Snowden harmed the United States by warning them. He warned them that they were being watch. So everyone was careful now to not get caught. Some people even stopped using technology to avoid trouble. Edward Snowden harmed the United States because he warned people, copied classified information, and made terrorist change their meaning of communication.…

    • 475 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Security in the News

    • 862 Words
    • 4 Pages

    The latest security leaks coming from Edward Snowden, American whistleblower, dissident and fugitive who was reportedly obtained millions of documents from his former employer National Security Agency (NSA)1, reveal the amount of hypocrisy American officials have being portraying in dealing with alleged cyber security issues in recent years.…

    • 862 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Human Capital Management

    • 3306 Words
    • 11 Pages

    Silowash, G. (2013). Seven Ways Insider Threat Products Can Protect Your Organization. Retrieved from http://www.cert.org/blogs/insider-threat/post.cfm?EntryID=174.…

    • 3306 Words
    • 11 Pages
    Powerful Essays