Verified Document

Computer Security Over The Last Several Years, Essay

Computer Security Over the last several years, cyber attacks have been continually rising. This is in response to emerging threats from nations such as China who are increasing their attacks on government and military installations. According to James Clapper (the Director of National Intelligence) these threats have become so severe that they are surpassing terrorism as the greatest challenge facing the nation. To fully understand what is occurring requires focusing on a recent attack and the underlying effects. Together, these elements will highlight the scope of the threats on government and military information systems. (Hosenball, 2013)

In early September 2012, the White House was the target of a cyber phishing attack. This is when hackers sent a fictitious email (which looked official) to this location. One of the staffers made a critical mistake in opening it. This infected a variety of computer networks and gave them access to some of the most sensitive information on their unsecured servers. Commenting about what was happening is Anup Ghosh ( the founder and CEO of security...

However, when they open it, is the point they can be providing hackers with access to their computer networks. (Winter, 2012)
After evaluating where the attack came from; it was determined that the Chinese government was responsible for the incident. According to White House officials, these incidents have become more blatant with them saying, "The cyber breach was one of Beijing's most brazen cyber attacks against the United States. In this instance the attack was identified, the system was isolated, and there is no indication whatsoever that any ex-filtration of data took place. Moreover, there was never any impact or attempted breach of any classified system. Over the past 24 months, China…

Sources used in this document:
References

Hosenball, M. (2013). Cyber Attacks Leading Threats. Reuters.com. Retrieved from: http://www.reuters.com/article/2013/03/12/us-usa-threats-idUSBRE92B0LS20130312

Schwartz, M. (2013). 10 Strategies. Information Week. Retrieved from: http://www.informationweek.com/security/vulnerabilities/10-strategies-to-fight-anonymous-ddos-at/232600411

Winter, J. (2012). Washington Confirms Chinese Attack. Fox News. Retrieved from: http://www.foxnews.com/tech/2012/10/01/washington-confirms-chinese-hack-attack-on-white-house-computer/
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Security We Have Achieved
Words: 1915 Length: 7 Document Type: Essay

This particular instance was significant as the attackers used a generic approach instead of a site specific or application specific exploitation by devising tools that used the web search engines to identify ASP applications that are vulnerable. SQL injection attack was used to propagate the malicious code that exploited zero day vulnerability in Microsoft Internet explorer last year. [Symantec, (2009 ) pg. (47)] the aim of the attackers employing

Computer Security: Corporate Security Documentation Suitable for
Words: 5280 Length: 19 Document Type: Essay

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

Computer Vulnerabilities Computer Security Vulnerabilities the Extent...
Words: 1375 Length: 5 Document Type: Research Paper

Computer Vulnerabilities Computer Security Vulnerabilities The extent of the problem This is not a small issue. The book "Analyzing Computer Security" lays out the following scenario: "First, 20 million U.S. smart phones stop working. Next follow outages in wireline telephone service, problems with air traffic control, disruptions to the New York Stock Exchange, and eventually severe loss of power on America's East Coast" (Pfleeger & Pfleeger, 2011, 3). The authors are talking about

Computer Security Briefly Support Your
Words: 2728 Length: 8 Document Type: Term Paper

The public-key cryptography approach also creates a more efficient means of cryptographic security by ensuring RSA-compliant encryption and decryption throughout the secured network (Sarkar, Maitra, 2010). As a result the use of public-key cryptography hardens and makes more secure each connection and node on a network (Chevalier, Rusinowitch, 2010). C3. What will help you trust a public-key that belongs to an unfamiliar person or Web site, and why does it

Computer Security
Words: 1081 Length: 4 Document Type: Term Paper

Computer Security In the past few years, viruses like "I Love You" and "SoBig" have generated much publicity and apprehension and highlighted problems of computer security. In the last month alone, experts estimate that 52 new viruses have spread through computer networks. In addition, the growing incidence of identity theft also illustrates the growing sophistication of hackers and their tools. This paper examines the main problems related to keeping the information on

Information Technology Security Over the Last Several
Words: 1389 Length: 4 Document Type: Essay

Information Technology Security Over the last several years, the Internet has evolved to the point that it is a part of any organizations activities. As both governments and businesses are using this new technology, to store as well as retrieve significant amounts of information. However, this heavy reliance on various IT related protocols are having adverse effects on these organizations. As they are facing increasing amounts of threats from cyber

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now