Date: 9/21/14 Class: CSIT 101 Assignment 1: Information Literacy 1. Use the Internet to find a Technology current event article: Topic choice: Security Article link: http://money.cnn.com/2014/09/08/technology/security/home-depot- breach/?iid=EL 2. Write a paragraph summarizing the article: Recently Home Depot has confirmed existence of hackers technology hidden in its payment system about five months. Firstly, after some fishiness had been noticed by a cybersecurity expert, Brian Krebs, investigation was started to bring out the fraudulent activity by the hackers, which is believed be active since April. The malwares, however, did steal uncertain numbers of credit and debit card from the customers who shopped in America and Canada. Plus, the information whether or not the debit card PINs were stolen is still unavailable. Even though the cybersecurity expert did have some warnings upon the possibility of further problems with cybercrime and the debit card PINs, which can easily help the hacker to withdraw cash from ATMs, Home Depot spokeswoman, Paula Drake made no statements about this threat. 3. Find two additional Internet articles on the same topic: Search engines that the student used: Google and Yahoo. 2
Two additional Internet resources: http://www.theguardian.com/technology/2014/sep/18/google-dropbox-simply-secure- security-tech http://tribune.com.pk/story/764713/online-security-pakistani-helps-google-avoid- privacy-disaster/ Comparing: The Google search engine and Yahoo search engine are equally efficient in finding the topic online security. However, Google search engine has a tendency to give out the first resources to be Wikipedia and advertisement link, while Yahoo search engine leads to the government site, which is much more reputable and trust worthy. But when scrolling down, the Google search engine provides more in-depth article about the topic so in the long term, in my opinion, Google search engine is better than the Yahoo search engine. 4. TRAAP sources: -The second one was written recently on September 20 th , 2014. And it sure has been updated. -The source does relate directly to the question I concern with. -The authors information reports that he is a professional penetration tester in the Information Technology field. -This information is trustworthy since it is supported by other well-known site as forbes.com and comments from professional expert in the field. -This article was written to inform. And there is no bias in this article. 3
5. Find two scholarly journal articles on the same topic from CCBC library database -Keywords: Cyber security -List the database: ProQuest - The two scholarly journal articles: http://search.proquest.com.ccbcmd.idm.oclc.org/sciencejournals/docview/218575852/full textPDF/7B8E08E4BDFC4460PQ/14?accountid=3784 http://search.proquest.com.ccbcmd.idm.oclc.org/sciencejournals/docview/872363390/full textPDF/2EF3D5EC6B5A4EA7PQ/32?accountid=3784 6. Compare the Internet and Journal articles: Internet articles are often easier to access than the Journal articles from the database such as ProQuest Journal. However, the abilities to classify the publish date, and categories of the articles are more available through the databases accessed from CCBC library so the students can find more up-to-date, and relevant articles. In addition, the authority from the scholarly Journal articles are absolutely certain and verified more than any resources wandering around on the Internet. Therefore, for conducting research, the databases provided by CCBC library are more reliable. 7. The format that I use is MLA. The work cited page is represented on the next page. There are five resources that one needs to cite.
4
5
Works Cited Baloch, Farooq. "Online Security: Pakistani Helps Google Avoid Privacy Disaster." The Express Tribune Online Security Pakistani Helps Google Avoid Privacy Disaster Comments. The Express Tribune, 20 Sept. 2014. Web. 22 Sept. 2014. Pagliery, Jose. "Home Depot Confirms Hack, Maybe since April." CNNMoney. Cable News Network, 8 Sept. 2014. Web. 22 Sept. 2014. Rushe, Dominic. "Google and Dropbox Launch Simply Secure to Improve Online Security." The Guardian. Theguardian.com, 18 Sept. 2014. Web. 22 Sept. 2014. Wagner, Cynthia G. "Countering Cyber Attacks." The Futurist 41.3 (2007): 16. ProQuest. Web. 21 Sep. 2014. Weinberger, Sharon. "IS THIS THE START OF CYBERWARFARE?" Nature 474.7350 (2011): 142-5. ProQuest. Web. 21 Sep. 2014.