Computer Security Over The Last Several Years, Essay

Computer Security Over the last several years, cyber attacks have been continually rising. This is in response to emerging threats from nations such as China who are increasing their attacks on government and military installations. According to James Clapper (the Director of National Intelligence) these threats have become so severe that they are surpassing terrorism as the greatest challenge facing the nation. To fully understand what is occurring requires focusing on a recent attack and the underlying effects. Together, these elements will highlight the scope of the threats on government and military information systems. (Hosenball, 2013)

In early September 2012, the White House was the target of a cyber phishing attack. This is when hackers sent a fictitious email (which looked official) to this location. One of the staffers made a critical mistake in opening it. This infected a variety of computer networks and gave them access to some of the most sensitive information on their unsecured servers. Commenting about what was happening is Anup Ghosh ( the founder and CEO of security...

...

However, when they open it, is the point they can be providing hackers with access to their computer networks. (Winter, 2012)
After evaluating where the attack came from; it was determined that the Chinese government was responsible for the incident. According to White House officials, these incidents have become more blatant with them saying, "The cyber breach was one of Beijing's most brazen cyber attacks against the United States. In this instance the attack was identified, the system was isolated, and there is no indication whatsoever that any ex-filtration of data took place. Moreover, there was never any impact or attempted breach of any classified system. Over the past 24 months, China…

Sources Used in Documents:

References

Hosenball, M. (2013). Cyber Attacks Leading Threats. Reuters.com. Retrieved from: http://www.reuters.com/article/2013/03/12/us-usa-threats-idUSBRE92B0LS20130312

Schwartz, M. (2013). 10 Strategies. Information Week. Retrieved from: http://www.informationweek.com/security/vulnerabilities/10-strategies-to-fight-anonymous-ddos-at/232600411

Winter, J. (2012). Washington Confirms Chinese Attack. Fox News. Retrieved from: http://www.foxnews.com/tech/2012/10/01/washington-confirms-chinese-hack-attack-on-white-house-computer/


Cite this Document:

"Computer Security Over The Last Several Years " (2013, May 04) Retrieved May 5, 2024, from
https://www.paperdue.com/essay/computer-security-over-the-last-several-88089

"Computer Security Over The Last Several Years " 04 May 2013. Web.5 May. 2024. <
https://www.paperdue.com/essay/computer-security-over-the-last-several-88089>

"Computer Security Over The Last Several Years ", 04 May 2013, Accessed.5 May. 2024,
https://www.paperdue.com/essay/computer-security-over-the-last-several-88089

Related Documents

Management Over the last several years, a wide variety of financial institutions have been facing a number of different security challenges. This is because of the information that they are storing has sensitive data about their clients such as: the social security numbers and net worth. Over the course of time, this has become a major target for identify thieves who are looking to steal this material. At which point,

Honey Pots Over the last several years, the issue of security has been increasingly brought to the forefront. This is because more hackers are able to successful breach different security protocols. Recently, honeypots have evolved to protect against these kinds of challenges. This is a system which is set up on the Internet to attract those who are trying to breach other computers or servers. (Spitzner, 2010) To fully understand how this

Strategic Alignment In the last several years, the Strategic Alignment Maturity model is focusing on understanding how an organization can evolve with the different challenges they are facing. This is achieved by carefully examining the business and IT configuration of the firm. To fully understand how this works requires comparing the model with an actual health care organization (i.e. Kaiser Permanente). These insights will illustrate its effectiveness and how it helps

This particular instance was significant as the attackers used a generic approach instead of a site specific or application specific exploitation by devising tools that used the web search engines to identify ASP applications that are vulnerable. SQL injection attack was used to propagate the malicious code that exploited zero day vulnerability in Microsoft Internet explorer last year. [Symantec, (2009 ) pg. (47)] the aim of the attackers employing

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

Computer Vulnerabilities Computer Security Vulnerabilities The extent of the problem This is not a small issue. The book "Analyzing Computer Security" lays out the following scenario: "First, 20 million U.S. smart phones stop working. Next follow outages in wireline telephone service, problems with air traffic control, disruptions to the New York Stock Exchange, and eventually severe loss of power on America's East Coast" (Pfleeger & Pfleeger, 2011, 3). The authors are talking about