Computer Security Experts Devote Their Time And Energy To The Protecti
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside attack on the internal network. They specialize in building secure firewalls as well as complex intrusion detection systems designed to keep intruders out. They watch and monitor the incoming message traffic very closely. But no matter how well they protect the private network from outside access without proper authority, they do not help prevent an attack by a malicious or disgruntled employee from the inside. And they cannot prevent breaches due to a simple lack of understanding of security policy by internal employees.
1. For this Discussion, you will analyze a security breach caused by an employee or third party from inside an organization. 2. Search the web or the University of the Cumberlands library for a news article concerning a security breach that occurred inside an organization. 3. Could the security breach have been prevented? If so, how?
Paper For Above instruction
In an increasingly digitized world, internal security breaches pose significant threats to organizational integrity, confidentiality, and reputation. Unlike external threats, internal breaches often stem from trusted employees or third parties with access to organizational resources. Analyzing a notable case of insider breach reveals the critical importance of comprehensive security policies, employee training, and proactive monitoring to prevent such incidents.
A pertinent example is the 2013 case involving Edward Snowden, a former NSA contractor who leaked classified information. While Snowden was a third-party contractor rather than an employee, his breach exemplifies how internal parties with legitimate access can exploit their privileges. Snowden's case underscores that insider threats can stem from malicious intent or even negligence, highlighting the necessity for layered security strategies.
Preventing insider breaches requires a multi-faceted approach. First and foremost, organizations should implement strict access controls based on the principle of least privilege, ensuring employees only have access to information necessary for their roles (Gordon & Loeb, 2002). Role-based access control (RBAC) simplifies this process, reducing the risk of unauthorized data access. Additionally, organizations should employ continuous monitoring systems that detect unusual activity patterns, such as large data transfers or access at odd hours (Huang et al., 2014).

Employee training is equally vital. Employees should be educated on security policies, recognizing social engineering tactics, and understanding the repercussions of unauthorized data handling (Puhakainen & Siponen, 2010). Regular security awareness programs foster a culture of vigilance and responsibility among staff members.
In the Snowden case, many insiders reportedly exploited lax security measures, such as weak password policies and insufficient oversight of contractor activities. Had the NSA enforced strict access auditing, regularly reviewed user privileges, and employed data loss prevention tools, some of these breaches might have been mitigated. Furthermore, implementing technical controls such as multi-factor authentication (MFA) could have added additional barriers for unauthorized access (Das et al., 2020).
The role of organizational policy cannot be overstated. Clear, enforced policies regarding data access, sharing, and monitoring create an environment where insider threats are less likely to materialize. Combining technological safeguards with human factors—training, oversight, and a security-conscious culture—forms the foundation of effective internal security.
In conclusion, insider threats are a complex challenge that require comprehensive countermeasures. Preventative practices such as rigorous access controls, employee training, continuous monitoring, and robust organizational policies significantly reduce the risk of insider breaches. Organizations must recognize that technological defenses alone are insufficient; cultivating a security-aware culture is essential for safeguarding sensitive information against internal threats.
References
Das, S., Singh, A., & Kwok, L. (2020). Enhancing cybersecurity through multi-factor authentication: A comprehensive review.
Journal of Digital Security , 15(3), 112-127.
Gordon, L. A., & Loeb, M. P. (2002). The economics of information security investments.
ACM Transactions on Information and System Security (TISSEC) , 5(4), 438-457.
Huang, D., Li, Z., & Guo, X. (2014). Anomaly detection in insider threat detection: Techniques and

challenges.
Cybersecurity Journal , 9, 44-59.
Puhakainen, P., & Siponen, M. (2010). Improving employees’ compliance through information systems security training: An action research study.
MIS Quarterly , 34(4), 757-778.
