There’s been a lot written about WikiLeaks over the past few weeks–some of it fair and some a bit off base. No question that there was a security breach related to classified documents ending up on WikiLeaks but it is important to dig a bit further to define what may have gone wrong.
Here are the elements of security involved and where a breakdown may have occurred:
It’s easy to point fingers at the State Department or Federal Government but any security professional can tell you that these problems are fairly pervasive. In fact, see the recent ESG Research Report, “Assessing Cyber Supply Chain Security Vulnerabilities Within the US Critical Infrastructure,” for more alarming data about how vulnerable we are (the report can be downloaded at www.enterprisestrategygroup.com).
The sooner we realize and address these cyber security vulnerabilities, the better. This won’t eliminate breaches like the embarrassing WikiLeaks events, but it will lower the risk.
Related posts:
Tags: acceptable use policy, access control, cyber security, data classification, insider attack, principle of least privilege, Security, State Department, US Federal Government, user behavior monitoring, WikiLeaks
Name (required)
Mail (will not be published) (required)
Website
Your email: