3-4 Assignment_ Annotating Your Sources (2) (1)

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

123

Subject

English

Date

Jun 11, 2024

Type

docx

Pages

4

Uploaded by JudgeJayPerson671

Report
Luis 1 Luis Estrella Professor Shazia Ali English-123 Date 11/13/2022 3-4 Assignment: Annotating Your Sources 1st Source Author : O’Neil, Michael Title : Cyber Crime Dilemma: Is it Possible to Guarantee Both Security and Privacy? Database: JSTOR Journals The research article argues that the rise of interest in CyberSecurity by the government is also starting to overlap with public privacy online. It states that with the increase in technological advancements and hacking methods, the measures the government, such as the FBI, are taking trying to catch cybercriminals are starting to reach into the publics' personal lives. Such as the sniffing device they created called carnivore, which scans online traffic data and stores it for investigation, which sparked a problem in terms of privacy. Causing it to only be able to be used using a court order. But to add to that, since the internet is still relatively young, the laws on the use and access of information on the service are very vague and often contain gaps. Using C.R.A.A.P.O, the article scored a 39. It states a very solid opposing viewpoint and uses data to back it up, and the information is easily accessible and understandable from a reading standpoint. The opposing view that increasing the CyberSecurity field can become a privacy issue is a very good counter-argument and entirely reasonable.
Luis 2 2nd Source Author Tyas Tunggal Title Why is Cybersecurity Important? Database: Supplemental Index This article talks about why cybersecurity is so critical and why it's needed. The cyber field has many categories depending on the system, ranging from digital theft of private information to damage to governmental data. Without a cyber strategy, hackers can access all information and sensitive data. The article states that we are now in an age where a simple antivirus and firewall are no longer enough, cybercriminals are more competent than before, tactics are becoming more and more sophisticated, and conventional cyber defenses are no longer effective—causing significant risks for companies like amazon web services or apple’s iCloud which without proper protections, are susceptible to data breaches. Society has been more technologically reliant in the past few years, and there is no sign it will slow down. This article scored a 43 on the C.R.A.A.P.O test. It explains not only the need for cyber security but the why as well. It goes through many sources showing the constant rise in attacks and vulnerabilities in the past few years. The viewpoint shown supports my argument on why the CyberSecurity field is needed and demonstrates it throughout the article while explaining how attacks happen and measures one can take to avoid them.
Luis 3 3rd Source Author Karin Kelley Title What is Cybersecurity Database: JSTOR Journals This article goes in-depth on what cybersecurity is. With so much good coming from technology in the world its hard to think sometimes about the major risk of dwelling in the web. Every device and platform connected to the internet is susceptible. And with a steady rise of cybercrime and flaws being highlighted in systems daily, we start asking ourselves why CyberSecurity is so essential. Cyber Security is a discipline that covers how to defend our devices in day-to-day life from electronic attacks by hackers. Although the term Cyber Security is used loosely to cover any internet-related attack, from identity theft to international digital weapons, those not in the field need a solid grasp of what it is. Cisco systems is a tech conglomerate specializing in networking the cloud and security, which defines Cyber Security as “…the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.” Using C.R.A.A.P.O this article scored a 48. Throughout the entire article, there are embedded links in the text to further explain specific phrases or processes in some aspects of cyber security. It also builds on the need for cyber defense and what that defense is. This is very information rich and supports my argument tenfold and explains why Cyber Defense is something we need, especially in a day in age where the internet is connected to almost every aspect of our lives.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Luis 4