Example Of Essay On Relationship
Type of paper: Essay
Topic: Security, Information, House, White, Computers, Intelligence, Information Security, Infrastructure
Pages: 1
Words: 275
Published: 2021/02/22
Introduction to security
Holden, Matt. (2015, April 8). “White House computers are vulnerable to hackers.” Security Today.
Summary
This article focuses on the information that was revealed regarding the safety of computers at the White House. It reports that some computer systems at the White House are prone to hackers. The remarks came from a senior security adviser while responding to the information that Russian hackers had accessed important information regarding the activities of United States President Barack Obama. The White House needs to operate a secure system to ensure that its computer systems are safe. The article further reported that the White House announced that a federal agency would be created to combat the threats reading information security (Holden, 2015). Combating these threats would involve analysis of nation’s cybersecurity and recognizing existing weaknesses that demand immediate redress. The cyber threat intelligence integration center will be responsible for coordinating intelligence from agencies including NSA, FBI and the department of Homeland Security. The report concluded that the director of national intelligence will operate the center.
This article draws a relationship with the chapter on information security regarding activities of hackers. The advancement of technology has led to corresponding incidences of cybercrime and threats information security. Many of the world computer systems are exposed to various forms of threats perpetrated by hackers. The point of convergence of the article and the chapter is that hackers use clandestine means to access sensitive information. This information is always used to provide intelligence or purvey malicious intentions unsuspecting victims. In this article, the White House became the victim of a malicious attack. Another point of convergence is the response mechanisms. Both article and the chapter underscore an integrated security management framework that encompasses various security agencies. This framework allows for collaboration, information sharing and strategic positioning in combating information security threats.
Reference
Holden, Matt. (2015, April 8). White House computers are vulnerable to hackers. Security Today. Retrieved from http://security-today.com/articles/2015/04/08/white-house-computers-are-vulnerable-to-hackers.aspx
- APA
- MLA
- Harvard
- Vancouver
- Chicago
- ASA
- IEEE
- AMA