3-4 Assignment_ Annotating Your Sources (2) (1)
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
123
Subject
English
Date
Jun 11, 2024
Type
docx
Pages
4
Uploaded by JudgeJayPerson671
Luis 1
Luis Estrella
Professor Shazia Ali
English-123
Date 11/13/2022
3-4 Assignment: Annotating Your Sources
1st Source
Author
: O’Neil, Michael Title
: Cyber Crime Dilemma: Is it Possible to Guarantee Both Security and Privacy?
Database: JSTOR Journals
The research article argues that the rise of interest in CyberSecurity by the government is also starting to overlap with public privacy online. It states that with the increase in technological
advancements and hacking methods, the measures the government, such as the FBI, are taking trying to catch cybercriminals are starting to reach into the publics' personal lives. Such as the sniffing device they created called carnivore, which scans online traffic data and stores it for investigation, which sparked a problem in terms of privacy. Causing it to only be able to be used using a court order. But to add to that, since the internet is still relatively young, the laws on the use and access of information on the service are very vague and often contain gaps.
Using C.R.A.A.P.O, the article scored a 39. It states a very solid opposing viewpoint and uses data to back it up, and the information is easily accessible and understandable from a reading standpoint. The opposing view that increasing the CyberSecurity field can become a privacy issue is a very good counter-argument and entirely reasonable.
Luis 2
2nd Source
Author Tyas Tunggal
Title Why is Cybersecurity Important?
Database: Supplemental Index
This article talks about why cybersecurity is so critical and why it's needed. The cyber field has many categories depending on the system, ranging from digital theft of private information to damage to governmental data. Without a cyber strategy, hackers can access all information and sensitive data. The article states that we are now in an age where a simple antivirus and firewall are no longer enough, cybercriminals are more competent than before, tactics are becoming more and more sophisticated, and conventional cyber defenses are no longer effective—causing significant risks for companies like amazon web services or apple’s iCloud which without proper protections, are susceptible to data breaches. Society has been more
technologically reliant in the past few years, and there is no sign it will slow down. This article scored a 43 on the C.R.A.A.P.O test. It explains not only the need for cyber security but the why as well. It goes through many sources showing the constant rise in attacks and vulnerabilities in the past few years. The viewpoint shown supports my argument on why the
CyberSecurity field is needed and demonstrates it throughout the article while explaining how attacks happen and measures one can take to avoid them.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help