- Introduction
- The Insider Scenario
- The Security Breach
- Corrective Actions
- Don't Be an Unwitting Collaborator
Don't Be an Unwitting Collaborator
We've seen how easy it is to get around our immigration policies and procedures. Granting student visas to the 9/11 terrorists two months after they flew into the Twin Towers is one such example. Don't let your organization make the same mistake of closing the barn door after the horse has left. Good human IT corporate policies and procedures must be in place to make sure that the honest stay honest and prevent a terrorist from planting himself in your private or public organization to gather, change, or destroy information.
Internal threats from terrorists cannot take place without the cooperationthrough incompetence or designof the owners of the nation's information infrastructure. Every organization responsible for attaching itself to the public computer network is a combatant in our current war on terrorism and should be diligent as to who has access to your network and how it is attained.