Type of paper: Essay

Topic: Security, Information, House, White, Computers, Intelligence, Information Security, Infrastructure

Pages: 1

Words: 275

Published: 2021/02/22

New WowEssays Premium Database!

Find the biggest directory of over
1 million paper examples!

Introduction to security

Holden, Matt. (2015, April 8). “White House computers are vulnerable to hackers.” Security Today.

Summary

This article focuses on the information that was revealed regarding the safety of computers at the White House. It reports that some computer systems at the White House are prone to hackers. The remarks came from a senior security adviser while responding to the information that Russian hackers had accessed important information regarding the activities of United States President Barack Obama. The White House needs to operate a secure system to ensure that its computer systems are safe. The article further reported that the White House announced that a federal agency would be created to combat the threats reading information security (Holden, 2015). Combating these threats would involve analysis of nation’s cybersecurity and recognizing existing weaknesses that demand immediate redress. The cyber threat intelligence integration center will be responsible for coordinating intelligence from agencies including NSA, FBI and the department of Homeland Security. The report concluded that the director of national intelligence will operate the center.

This article draws a relationship with the chapter on information security regarding activities of hackers. The advancement of technology has led to corresponding incidences of cybercrime and threats information security. Many of the world computer systems are exposed to various forms of threats perpetrated by hackers. The point of convergence of the article and the chapter is that hackers use clandestine means to access sensitive information. This information is always used to provide intelligence or purvey malicious intentions unsuspecting victims. In this article, the White House became the victim of a malicious attack. Another point of convergence is the response mechanisms. Both article and the chapter underscore an integrated security management framework that encompasses various security agencies. This framework allows for collaboration, information sharing and strategic positioning in combating information security threats.

Reference

Holden, Matt. (2015, April 8). White House computers are vulnerable to hackers. Security Today. Retrieved from http://security-today.com/articles/2015/04/08/white-house-computers-are-vulnerable-to-hackers.aspx

Cite this page
Choose cite format:
  • APA
  • MLA
  • Harvard
  • Vancouver
  • Chicago
  • ASA
  • IEEE
  • AMA
WePapers. (2021, February, 22) Example Of Essay On Relationship. Retrieved August 05, 2021, from https://www.wepapers.com/samples/example-of-essay-on-relationship/
"Example Of Essay On Relationship." WePapers, 22 Feb. 2021, https://www.wepapers.com/samples/example-of-essay-on-relationship/. Accessed 05 August 2021.
WePapers. 2021. Example Of Essay On Relationship., viewed August 05 2021, <https://www.wepapers.com/samples/example-of-essay-on-relationship/>
WePapers. Example Of Essay On Relationship. [Internet]. February 2021. [Accessed August 05, 2021]. Available from: https://www.wepapers.com/samples/example-of-essay-on-relationship/
"Example Of Essay On Relationship." WePapers, Feb 22, 2021. Accessed August 05, 2021. https://www.wepapers.com/samples/example-of-essay-on-relationship/
WePapers. 2021. "Example Of Essay On Relationship." Free Essay Examples - WePapers.com. Retrieved August 05, 2021. (https://www.wepapers.com/samples/example-of-essay-on-relationship/).
"Example Of Essay On Relationship," Free Essay Examples - WePapers.com, 22-Feb-2021. [Online]. Available: https://www.wepapers.com/samples/example-of-essay-on-relationship/. [Accessed: 05-Aug-2021].
Example Of Essay On Relationship. Free Essay Examples - WePapers.com. https://www.wepapers.com/samples/example-of-essay-on-relationship/. Published Feb 22, 2021. Accessed August 05, 2021.
Copy

Share with friends using:

Please remember that this paper is open-access and other students can use it too.

If you need an original paper created exclusively for you, hire one of our brilliant writers!

GET UNIQUE PAPER
Related Premium Essays
Contact us
Chat now