3-4 Assignment_ Annotating Your Sources (2) (1)

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

123

Subject

English

Date

Jun 11, 2024

Type

docx

Pages

4

Uploaded by JudgeJayPerson671

Report
Luis 1 Luis Estrella Professor Shazia Ali English-123 Date 11/13/2022 3-4 Assignment: Annotating Your Sources 1st Source Author : O’Neil, Michael Title : Cyber Crime Dilemma: Is it Possible to Guarantee Both Security and Privacy? Database: JSTOR Journals The research article argues that the rise of interest in CyberSecurity by the government is also starting to overlap with public privacy online. It states that with the increase in technological advancements and hacking methods, the measures the government, such as the FBI, are taking trying to catch cybercriminals are starting to reach into the publics' personal lives. Such as the sniffing device they created called carnivore, which scans online traffic data and stores it for investigation, which sparked a problem in terms of privacy. Causing it to only be able to be used using a court order. But to add to that, since the internet is still relatively young, the laws on the use and access of information on the service are very vague and often contain gaps. Using C.R.A.A.P.O, the article scored a 39. It states a very solid opposing viewpoint and uses data to back it up, and the information is easily accessible and understandable from a reading standpoint. The opposing view that increasing the CyberSecurity field can become a privacy issue is a very good counter-argument and entirely reasonable.
Luis 2 2nd Source Author Tyas Tunggal Title Why is Cybersecurity Important? Database: Supplemental Index This article talks about why cybersecurity is so critical and why it's needed. The cyber field has many categories depending on the system, ranging from digital theft of private information to damage to governmental data. Without a cyber strategy, hackers can access all information and sensitive data. The article states that we are now in an age where a simple antivirus and firewall are no longer enough, cybercriminals are more competent than before, tactics are becoming more and more sophisticated, and conventional cyber defenses are no longer effective—causing significant risks for companies like amazon web services or apple’s iCloud which without proper protections, are susceptible to data breaches. Society has been more technologically reliant in the past few years, and there is no sign it will slow down. This article scored a 43 on the C.R.A.A.P.O test. It explains not only the need for cyber security but the why as well. It goes through many sources showing the constant rise in attacks and vulnerabilities in the past few years. The viewpoint shown supports my argument on why the CyberSecurity field is needed and demonstrates it throughout the article while explaining how attacks happen and measures one can take to avoid them.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help