Verified Document

Cyber Attack On White House Chapter

White House Information Security Breach Russian hackers blamed for cyber attack that exposed President's private schedule - as White House insists computer system is secure-by Daily Mail

The article is a of the six months investigations that were commenced on the cause and source of the cyber attack and information security breach that took place in October 2014 within the State Department and exposed some of the restricted information within the White House. The report indicates that the possible culprits in the information compromise were the private schedule of the president of the United States and the emails of some of the people working within White House.

Further, the article attributes this act of cyber attack on a group of cyber-bandits who were working on behalf of the Russian government and Vladimir Putin. Immediate measures were taken once the compromise was noted and systems shut down and upgraded to avoid a repeat of the same, the Daily mail however insinuates that an anonymous source shared with them that a re-entry into the White House systems has taken place by the same group. It is also indicated that the Russian embassy refused to comment on the allegations on the involvement of their country. The white house also refuted the claims that the systems have since been hacked into again. Through the White House deputy national security adviser, Ben Rhodes, the State Department clarified that though the intrusion took place, it did not compromise the classified information as the attack only reached the unclassified system. The writer alludes that the cyber attack was facilitated through an act known...

It is however disturbing to know that data at white house was accessed from a suspected rival of the U.S. And even more scary is the fact that no ordinary person knows how much of the data was accessed and to what use the hackers and the Russian government will put the information they have from white house. The president is known to use his blackberry to send and receive mails and communicate with other white house staff and the amounts of data and the levels of confidentiality of the data could be very sensitive.
Cause of the cyberattack and necessary measures

Critics say that the attack was successful due to the failure of white house to adopt to the new codes and instead relying on codes that have been in use over the decade and to make matters worse, the State Department used the public lines in their mail systems which was a major facilitator to the attack. Russia is seen as a bigger threat in the cyberspace than the traditional threats like China and…

Sources used in this document:
References

Daily Mail, (2015). Russian hackers blamed for cyber attack that exposed President's private schedule - as White House insists computer system is secure. http://www.dailymail.co.uk/news/article-3029768/Russian-hackers-blamed-cyber-attack-exposed-president-s-private-schedule-Obama-aide-insists-White-House-computer-secure.html

Frank J.C. & Sharon L.C. (2015). How to Stop Putin Hacking the White House. http://www.newsweek.com/how-stop-putin-hacking-white-house-321857
Cite this Document:
Copy Bibliography Citation

Related Documents

Computers and Security Cyberattacks on
Words: 705 Length: 2 Document Type: Essay

All of those sites were U.S. government sites. The July 6 update increased the number to 21 U.S. sites. On July 7, the South Korean sites were added and on July 8, the total number of sites reached 26 ("No Sign of N. Korea Backing," 2009) The U.S. Websites were back up and running within a day of the attack. The South Korean sites took more time to recover ("Cyberattacks

National Security Implications of Transnational Organized Crime
Words: 3380 Length: 9 Document Type: Essay

National Security Implications of Transnational Organized Crime The paper deals with three important aspects, one the National Security, second the crime -- organized in many ways, and the third rogue nations that pose a threat. National security is to be understood in multiple contexts. Firstly the physical security of the nation from alien threats, and intrusions, secondly damages to vital infrastructure and thirdly anti-national activities by organizations that may lead to

Cyber Terrorism
Words: 3249 Length: 11 Document Type: Term Paper

internet and the increased availability of personal computers around the world have increased the vulnerability of critical infrastructure systems. In recent years computers have been used by terrorist to distribute information about terrorist attacks. Now many experts fear that terrorist will use computers to carry out an attack on electricity grid or other systems that are crucial to the operation of a nation's infrastructure. The purpose of this discussion

Cyber Warfare
Words: 2636 Length: 10 Document Type: Term Paper

Cyber warfare continues to grow larger than imagination as the public becomes more aware of and involved in technology. This work in writing will identify a case study that presents a 'cell', 'klan', or 'state', which conducted or has the capacity to conduct cyber warfare. This work will describe the elements of: who, what, where, and why and means of conducting such cyber warfare and the organizational ideology behind the

Cybersecurity in October 2010, Wikileaks, an International
Words: 1123 Length: 4 Document Type: Essay

Cybersecurity In October 2010, Wikileaks, an international organization that publishes submissions of private, secret, and classified media ("leaks") by anonymous sources, released "the Iraq War Logs," almost 400,000 documents which allowed major media outlets to map every death that took place in Iraq or Iran during the recent conflict. In November 2010, Wikileaks, released U.S. State Department diplomatic cables, creating an international scandal. The recent media coverage of these events

Why UAE Signed Deal with Israel
Words: 3276 Length: 11 Document Type: Research Paper

UAE and Israel: Uniting to Oppose Common EnemiesIntroductionWhy has the UAE determined that now is a good time to formalize relations with Israel? One reason for the timing is that Iran has been growing its power and support network for years, backing groups like Hezbollah and Hamas, which the UAE sees as a threat to peace. The UAE does not support these groups and has condemned others, like the Muslim

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now