The response focuses on the improvement of the security of existing information systems. While the critique provided sufficient discussion on the problem of security, it did not note what is put at risk when there is a security breach and more aptly, what the results of a security breach are. When an IT system is attacked, the attacker may hold access to classified information which may be used for personal gain.

Leave a Reply

Your email address will not be published. Required fields are marked *