{"id":4951,"date":"2014-02-17T07:43:12","date_gmt":"2014-02-17T12:43:12","guid":{"rendered":"http:\/\/www.opensource.im\/?p=4951"},"modified":"2014-02-17T07:43:12","modified_gmt":"2014-02-17T12:43:12","slug":"how-nsa-spying-disclosures-influence-security-strategies","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/nsa-spying\/how-nsa-spying-disclosures-influence-security-strategies.php","title":{"rendered":"How NSA spying disclosures influence security strategies"},"content":{"rendered":"<p><p>    How has whistleblower Edward Snowdens exposs affected the    ways organisations deal with internal and external security    threats?  <\/p>\n<p>        Edward Snowdens revelations about mass internet    surveillance conducted by the US National Security Agency (NSA)    and the UKs GCHQ has caused consternation around the world,    particularly in Europe.  <\/p>\n<p>    While the revelations have generated much debate and given    security suppliers a golden opportunity to say how they could    have stopped the CIA contractor in his tracks, one question    remains for security professionals.  <\/p>\n<p>    Regardless of motives and objectives, how should Snowdens    revelations influence businesses information security    strategies?  <\/p>\n<p>    While it is difficult to get a clear-cut, unqualified answer to    this, most information security professionals feel Snowden did    not really uncover anything new, and some are unequivocal in    their response. \"Organisations should not build their strategy    around stopping the NSA or GCHQ monitoring: this is a very    negative, reactive and ultimately pointless exercise,\" says    Adrian Davis, principal research analyst at the Information    Security Forum (ISF).  <\/p>\n<p>    \"At the ISF, we state that an organisations information    security strategy should support the business strategy and    allow the organisation to conduct and grow its business in a    secure and robust manner, by protecting the organisations    assets  including information  against a range of threats.\"  <\/p>\n<p>    An important part of the strategy, he says, should be to create    and implement processes to manage contractors; control access    rights and stop accrual of such rights by employees and    contractors; and to monitor and review critical system activity    on a regular basis.  <\/p>\n<p>    These were some of the flaws that allowed the leaks to occur,    says Davis.  <\/p>\n<p>    But, like many others in the security industry, he feels the    revelations that certain technologies, especially encryption,    have back doors should come as no surprise. \"The key here is to    determine whether the back doors pose an exploitable    vulnerability  and if the organisation has deployed or can    deploy measures to mitigate the vulnerability,\" says    Davis.\"This brings us to risk assessment, which should inform    the choice about what software to use, decide whether to use    open source software, or choose another control to apply.\"  <\/p>\n<p>    In the wake of the Snowden revelations, the open source    community has suggested that having software open to the    scrutiny of all will     eliminate back doors for spy agencies. \"This seems    counterintuitive,\" says Robert Newby, analyst and managing    partner at KuppingerCole UK. \"But, simply put, if everyone can    see it, it tends to keep people honest  and is that not what    Snowden was trying to do in the first place?\"  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.computerweekly.com\/feature\/How-NSA-spying-disclosures-influence-security-strategies\" title=\"How NSA spying disclosures influence security strategies\">How NSA spying disclosures influence security strategies<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> How has whistleblower Edward Snowdens exposs affected the ways organisations deal with internal and external security threats? Edward Snowdens revelations about mass internet surveillance conducted by the US National Security Agency (NSA) and the UKs GCHQ has caused consternation around the world, particularly in Europe. While the revelations have generated much debate and given security suppliers a golden opportunity to say how they could have stopped the CIA contractor in his tracks, one question remains for security professionals. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[],"class_list":["post-4951","post","type-post","status-publish","format-standard","hentry","category-nsa-spying"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/4951"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=4951"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/4951\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=4951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=4951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=4951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}