Type of paper: Essay

Topic: Security, Information, House, White, Computers, Intelligence, Information Security, Infrastructure

Pages: 1

Words: 275

Published: 2021/02/22

Introduction to security

Holden, Matt. (2015, April 8). “White House computers are vulnerable to hackers.” Security Today.


This article focuses on the information that was revealed regarding the safety of computers at the White House. It reports that some computer systems at the White House are prone to hackers. The remarks came from a senior security adviser while responding to the information that Russian hackers had accessed important information regarding the activities of United States President Barack Obama. The White House needs to operate a secure system to ensure that its computer systems are safe. The article further reported that the White House announced that a federal agency would be created to combat the threats reading information security (Holden, 2015). Combating these threats would involve analysis of nation’s cybersecurity and recognizing existing weaknesses that demand immediate redress. The cyber threat intelligence integration center will be responsible for coordinating intelligence from agencies including NSA, FBI and the department of Homeland Security. The report concluded that the director of national intelligence will operate the center.

This article draws a relationship with the chapter on information security regarding activities of hackers. The advancement of technology has led to corresponding incidences of cybercrime and threats information security. Many of the world computer systems are exposed to various forms of threats perpetrated by hackers. The point of convergence of the article and the chapter is that hackers use clandestine means to access sensitive information. This information is always used to provide intelligence or purvey malicious intentions unsuspecting victims. In this article, the White House became the victim of a malicious attack. Another point of convergence is the response mechanisms. Both article and the chapter underscore an integrated security management framework that encompasses various security agencies. This framework allows for collaboration, information sharing and strategic positioning in combating information security threats.


Holden, Matt. (2015, April 8). White House computers are vulnerable to hackers. Security Today. Retrieved from http://security-today.com/articles/2015/04/08/white-house-computers-are-vulnerable-to-hackers.aspx

Cite this page
Choose cite format:
  • APA
  • MLA
  • Harvard
  • Vancouver
  • Chicago
  • ASA
  • IEEE
  • AMA
WePapers. (2021, February, 22) Example Of Essay On Relationship. Retrieved November 30, 2022, from https://www.wepapers.com/samples/example-of-essay-on-relationship/
"Example Of Essay On Relationship." WePapers, 22 Feb. 2021, https://www.wepapers.com/samples/example-of-essay-on-relationship/. Accessed 30 November 2022.
WePapers. 2021. Example Of Essay On Relationship., viewed November 30 2022, <https://www.wepapers.com/samples/example-of-essay-on-relationship/>
WePapers. Example Of Essay On Relationship. [Internet]. February 2021. [Accessed November 30, 2022]. Available from: https://www.wepapers.com/samples/example-of-essay-on-relationship/
"Example Of Essay On Relationship." WePapers, Feb 22, 2021. Accessed November 30, 2022. https://www.wepapers.com/samples/example-of-essay-on-relationship/
WePapers. 2021. "Example Of Essay On Relationship." Free Essay Examples - WePapers.com. Retrieved November 30, 2022. (https://www.wepapers.com/samples/example-of-essay-on-relationship/).
"Example Of Essay On Relationship," Free Essay Examples - WePapers.com, 22-Feb-2021. [Online]. Available: https://www.wepapers.com/samples/example-of-essay-on-relationship/. [Accessed: 30-Nov-2022].
Example Of Essay On Relationship. Free Essay Examples - WePapers.com. https://www.wepapers.com/samples/example-of-essay-on-relationship/. Published Feb 22, 2021. Accessed November 30, 2022.

Share with friends using:

Related Premium Essays
Contact us
Chat now