{"id":279,"date":"2011-03-01T22:01:55","date_gmt":"2011-03-02T03:01:55","guid":{"rendered":"http:\/\/goodwin.drexel.edu\/isensor\/drho\/?p=279"},"modified":"2011-03-01T22:01:55","modified_gmt":"2011-03-02T03:01:55","slug":"dhs-report-digital-immigration-records-vulnerable-to-insider-threat","status":"publish","type":"post","link":"https:\/\/shuyuanmaryho.com\/?p=279","title":{"rendered":"DHS Report: Digital Immigration Records Vulnerable to \u2018Insider Threat\u2019"},"content":{"rendered":"<div class=\"fcbkbttn_buttons_block\" id=\"fcbkbttn_left\"><div class=\"fcbkbttn_button\">\n                            <a href=\"https:\/\/www.facebook.com\/\" target=\"_blank\">\n                                <img decoding=\"async\" src=\"https:\/\/shuyuanmaryho.com\/wp-content\/plugins\/facebook-button-plugin\/images\/standard-facebook-ico.png\" alt=\"Fb-Button\" \/>\n                            <\/a>\n                        <\/div><div class=\"fcbkbttn_like \"><fb:like href=\"https:\/\/shuyuanmaryho.com\/?p=279\" action=\"like\" colorscheme=\"light\" layout=\"standard\"  width=\"450px\" size=\"small\"><\/fb:like><\/div><\/div><p>The Department of Homeland Security\u2019s U.S. Citizen and Immigration Services has made progress securing its cyber networks from potential insider threats.<\/p>\n<p>However, gaps in security still remain, including one that could allow malicious insiders to tamper with digital immigration records.<\/p>\n<p>A far-reaching security audit of USCIS, undertaken by the Software Engineering Institute at Carnegie Mellon University singled out the Transformation program at Immigration and Customs Enforcement as one of the most vulnerable.<\/p>\n<p>The findings revealed the department had not taken enough steps to secure the digitized immigration paperwork, which\u2013 if tampered with \u2013could grant access to terrorists or other malcontents, Federal News Radio reported.<\/p>\n<p>The multimillion-dollar Transformation program, designed to digitize immigration records, has been plagued by work delays that have caused it to run 10 years behind schedule, InformationWeek reported.<\/p>\n<p>Despite the over-runs, DHS appears to be leaning heavily on the program \u201cto correct many of the problems resulting from legacy systems,\u201d according to InformationWeek. <\/p>\n<p>But, the recent IG report may put a new wrinkle in the program.<\/p>\n<p>Specifically, the report found while the Transformation program encompassed risk management, it had failed to adequately account for the risk from the insider threat.<\/p>\n<p>\u201cUSCIS should incorporate comprehensive insider threat risk mitigation requirements into the Transformation effort,\u201d the report found.<\/p>\n<p>Insider threat risk mitigation in the federal government received a jolt of attention following the revelations that a so-called insider \u2014 an allegedly disgruntled Army private \u2014 was reported to have leaked classified materials to whistle-blower site WikiLeaks.<\/p>\n<p>From ExecutiveGov.com: http:\/\/www.executivegov.com\/2011\/03\/dhs-report-digital-immigration-records-vulnerable-to-insider-threat\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Department of Homeland Security\u2019s U.S. Citizen and Immigration Services has made progress securing its cyber networks from potential insider threats. However, gaps in security still remain, including one that could allow malicious insiders to tamper with digital immigration records. &hellip; <a href=\"https:\/\/shuyuanmaryho.com\/?p=279\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-279","post","type-post","status-publish","format-standard","hentry","category-the-latest-news-ideas-problems-strategies-and-tactics-in-securing-cyberspace-and-virtual-organizations-discussed-by-experts-in-industries-as-well-as-academia"],"_links":{"self":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts\/279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=279"}],"version-history":[{"count":0,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts\/279\/revisions"}],"wp:attachment":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}