ITM 5600 WEEK 5 ARTICLE SRIRAM
docx
keyboard_arrow_up
School
University of the Fraser Valley *
*We aren’t endorsed by this school
Course
211
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
2
Uploaded by jacklinecheruto
ITM 5600 – Current Event Article Template
Paste
URL to
article:
https://www.researchgate.net/publication/369186216_A_Comprehensive_Review_of_Cybe
r_Security_Vulnerabilities_Threats_Attacks_and_Solutions
Title of
Article:
A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions
Author:
Ömer Aslan, Merve Ozkan Okay, Abdullah Asım Yılmaz,
Date of
Publica
tion:
March 2023
Brief
summa
ry of
article:
(no more
than 150
words)
In this article, the growing importance of cybersecurity in the digital age is discussed, with a
focus on the difficulties presented by online threats and the changing nature of
cyberattacks. An increased dependency on digital settings is the result of the internet's
rapid usage growth, which was sped further by the COVID-19 pandemic. Therefore, classic
crimes have moved into the digital sphere, where new security issues have been raised by
emerging technologies like cloud computing, the Internet of Things (IoT), social media,
wireless communication, and cryptocurrency.
The article lists several different kinds of cyberattacks, such as malware, distributed denial
of service (DDoS), phishing, man-in-the-middle attacks, password attacks, remote exploits,
and man-in-the-middle attacks. It underlines that more sophisticated cyber threats require
more than what can be handled by standard security measures like firewalls, intrusion
detection systems, and antivirus software.
Origina
l
comme
ntary
about
article
(50-
250
words):
This in-depth piece emphasizes how crucial cybersecurity is in our increasingly connected
digital world. It sheds light on the constantly changing nature of cyber dangers and the
difficulties they present for people, companies, and countries. We must change the way we
think about security because of the COVID-19 epidemic, rapid internet usage growth, and
the acceleration of traditional crimes into the digital sphere.
The concise description of the complex nature of cyber dangers is what stands out. It
explores the behavioral and procedural components of attacks in addition to their technical
aspects. Even if innovations in technology like block chain and AI, particularly machine
learning, provide hopeful solutions, they are not without drawbacks, such as exposure to
biases and evasion tactics.
The main takeaway from the article is the demand for cooperation among many parties.
Cybersecurity is a problem that cannot be solved by one organization acting alone. It
requires a coordinated effort from people, groups, authorities, and the tech sector. The
importance of user education and training cannot be overstated. Even the most
sophisticated security measures are only as effective as the people utilizing them.
Suggested list of publications to use as sources: You may deviate from this list, but you need to make
sure you are referencing a quality reputable source.
Reuters
CSO
Forbes
Al Jazeera
New York Times
Washington Post
Bleeping Computer
The Wall Street Journal
ZD Net
The Register
Ars Technica
The Guardian
The Hacker News
The Economist
ISACA Journal
Security Magazine
Harvard Business Review
Wired
The Record
TechCrunch
CNN
CNET
Security Week
Info Security Magazine
BBC
Associated Press
Bloomberg
Krebs on Security
Vice
LA Times
Axios
The Verge
Cyber Scoop
National Public Radio
Politico
Arxiv.org
Information Security
Professional
Possible topics to discuss in original commentary:
Who is the author and why are they credible on this topic? Or why are they not credible on this topic?
How old is the article and why is it still considered relevant?
What is the relationship of this content to the class material?
Why was this article chosen?
Can this subject be related to your personal experience somehow?
Is there something that surprises you or is doubtful about what was said in the article?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help