3-4 Assignment_ Annotating Your Sources (2) (1)
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
123
Subject
English
Date
Jun 11, 2024
Type
docx
Pages
4
Uploaded by JudgeJayPerson671
Luis 1
Luis Estrella
Professor Shazia Ali
English-123
Date 11/13/2022
3-4 Assignment: Annotating Your Sources
1st Source
Author
: O’Neil, Michael Title
: Cyber Crime Dilemma: Is it Possible to Guarantee Both Security and Privacy?
Database: JSTOR Journals
The research article argues that the rise of interest in CyberSecurity by the government is also starting to overlap with public privacy online. It states that with the increase in technological
advancements and hacking methods, the measures the government, such as the FBI, are taking trying to catch cybercriminals are starting to reach into the publics' personal lives. Such as the sniffing device they created called carnivore, which scans online traffic data and stores it for investigation, which sparked a problem in terms of privacy. Causing it to only be able to be used using a court order. But to add to that, since the internet is still relatively young, the laws on the use and access of information on the service are very vague and often contain gaps.
Using C.R.A.A.P.O, the article scored a 39. It states a very solid opposing viewpoint and uses data to back it up, and the information is easily accessible and understandable from a reading standpoint. The opposing view that increasing the CyberSecurity field can become a privacy issue is a very good counter-argument and entirely reasonable.
Luis 2
2nd Source
Author Tyas Tunggal
Title Why is Cybersecurity Important?
Database: Supplemental Index
This article talks about why cybersecurity is so critical and why it's needed. The cyber field has many categories depending on the system, ranging from digital theft of private information to damage to governmental data. Without a cyber strategy, hackers can access all information and sensitive data. The article states that we are now in an age where a simple antivirus and firewall are no longer enough, cybercriminals are more competent than before, tactics are becoming more and more sophisticated, and conventional cyber defenses are no longer effective—causing significant risks for companies like amazon web services or apple’s iCloud which without proper protections, are susceptible to data breaches. Society has been more
technologically reliant in the past few years, and there is no sign it will slow down. This article scored a 43 on the C.R.A.A.P.O test. It explains not only the need for cyber security but the why as well. It goes through many sources showing the constant rise in attacks and vulnerabilities in the past few years. The viewpoint shown supports my argument on why the
CyberSecurity field is needed and demonstrates it throughout the article while explaining how attacks happen and measures one can take to avoid them.
Luis 3
3rd Source
Author Karin Kelley
Title What is Cybersecurity
Database:
JSTOR Journals
This article goes in-depth on what cybersecurity is. With so much good coming from technology in the world its hard to think sometimes about the major risk of dwelling in the web. Every device and platform connected to the internet is susceptible. And with a steady rise of cybercrime and flaws being highlighted in systems daily, we start asking ourselves why CyberSecurity is so essential. Cyber Security is a discipline that covers how to defend our devices in day-to-day life from electronic attacks by hackers. Although the term Cyber Security is used loosely to cover any internet-related attack, from identity theft to international digital weapons, those not in the field need a solid grasp of what it is. Cisco systems is a tech conglomerate specializing in networking the cloud and security, which defines Cyber Security as
“…the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.”
Using C.R.A.A.P.O this article scored a 48. Throughout the entire article, there are embedded links in the text to further explain specific phrases or processes in some aspects of cyber security. It also builds on the need for cyber defense and what that defense is. This is very information rich and supports my argument tenfold and explains why Cyber Defense is something we need, especially in a day in age where the internet is connected to almost every aspect of our lives.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Luis 4