Sunteți pe pagina 1din 5

1

Name: Nhan Nguyen


Date: 9/21/14
Class: CSIT 101
Assignment 1: Information Literacy
1. Use the Internet to find a Technology current event article:
Topic choice: Security
Article link: http://money.cnn.com/2014/09/08/technology/security/home-depot-
breach/?iid=EL
2. Write a paragraph summarizing the article:
Recently Home Depot has confirmed existence of hackers technology hidden in
its payment system about five months. Firstly, after some fishiness had been noticed by a
cybersecurity expert, Brian Krebs, investigation was started to bring out the fraudulent
activity by the hackers, which is believed be active since April. The malwares, however,
did steal uncertain numbers of credit and debit card from the customers who shopped in
America and Canada. Plus, the information whether or not the debit card PINs were
stolen is still unavailable. Even though the cybersecurity expert did have some warnings
upon the possibility of further problems with cybercrime and the debit card PINs, which
can easily help the hacker to withdraw cash from ATMs, Home Depot spokeswoman,
Paula Drake made no statements about this threat.
3. Find two additional Internet articles on the same topic:
Search engines that the student used: Google and Yahoo.
2

Two additional Internet resources:
http://www.theguardian.com/technology/2014/sep/18/google-dropbox-simply-secure-
security-tech
http://tribune.com.pk/story/764713/online-security-pakistani-helps-google-avoid-
privacy-disaster/
Comparing: The Google search engine and Yahoo search engine are equally efficient
in finding the topic online security. However, Google search engine has a tendency
to give out the first resources to be Wikipedia and advertisement link, while Yahoo
search engine leads to the government site, which is much more reputable and trust
worthy. But when scrolling down, the Google search engine provides more in-depth
article about the topic so in the long term, in my opinion, Google search engine is
better than the Yahoo search engine.
4. TRAAP sources:
-The second one was written recently on September 20
th
, 2014. And it sure has been
updated.
-The source does relate directly to the question I concern with.
-The authors information reports that he is a professional penetration tester in the
Information Technology field.
-This information is trustworthy since it is supported by other well-known site as
forbes.com and comments from professional expert in the field.
-This article was written to inform. And there is no bias in this article.
3

5. Find two scholarly journal articles on the same topic from CCBC library database
-Keywords: Cyber security
-List the database: ProQuest
- The two scholarly journal articles:
http://search.proquest.com.ccbcmd.idm.oclc.org/sciencejournals/docview/218575852/full
textPDF/7B8E08E4BDFC4460PQ/14?accountid=3784
http://search.proquest.com.ccbcmd.idm.oclc.org/sciencejournals/docview/872363390/full
textPDF/2EF3D5EC6B5A4EA7PQ/32?accountid=3784
6. Compare the Internet and Journal articles:
Internet articles are often easier to access than the Journal articles from the database
such as ProQuest Journal. However, the abilities to classify the publish date, and
categories of the articles are more available through the databases accessed from
CCBC library so the students can find more up-to-date, and relevant articles. In
addition, the authority from the scholarly Journal articles are absolutely certain and
verified more than any resources wandering around on the Internet. Therefore, for
conducting research, the databases provided by CCBC library are more reliable.
7. The format that I use is MLA.
The work cited page is represented on the next page. There are five resources that one
needs to cite.


4


5

Works Cited
Baloch, Farooq. "Online Security: Pakistani Helps Google Avoid Privacy Disaster." The
Express Tribune Online Security Pakistani Helps Google Avoid Privacy Disaster
Comments. The Express Tribune, 20 Sept. 2014. Web. 22 Sept. 2014.
Pagliery, Jose. "Home Depot Confirms Hack, Maybe since April." CNNMoney. Cable News
Network, 8 Sept. 2014. Web. 22 Sept. 2014.
Rushe, Dominic. "Google and Dropbox Launch Simply Secure to Improve Online Security."
The Guardian. Theguardian.com, 18 Sept. 2014. Web. 22 Sept. 2014.
Wagner, Cynthia G. "Countering Cyber Attacks." The Futurist 41.3 (2007):
16. ProQuest. Web. 21 Sep. 2014.
Weinberger, Sharon. "IS THIS THE START OF CYBERWARFARE?" Nature 474.7350
(2011): 142-5. ProQuest. Web. 21 Sep. 2014.

S-ar putea să vă placă și