Sunteți pe pagina 1din 3

Alexander Carter

Information Literacy Assignment



1
1. Crime Ring Revelation Reveals Cybersecurity Conflict of Interest
2. Russian Internet thieves known as CyberVor stole about 500 million e-mail usernames
and passwords from 420,000 web and FTP sites. Using this information they we able to
attain the sensitive credentials of hundreds of millions of people. These credentials
included information that could grant access to banking, social media, and investment
accounts. Many businesses, especially cyber security firms, try to promote and
exaggerate hacking attacks (such as the one committed by CyberVor) to increase sales.
3. Article: Home Depot Admits 56 Million Payment Cards At Risk After Cyber Attack
Search Engine: Bing
Article: Cyber Attacks
Search Engine: Yahoo
Each search engine brought about many different results but the engines themselves were
very much the same at first glance. They both had advertisements and some of the same
web pages so in general, I felt no real reason to say that one was better than other.
4. Cyber Attacks
Time: July 10 2014
Relevance: My topic is cyber security so this article relates perfectly to my topic.
Authority: The author of this article is Mikko Hypponen. He is the chief research officer
of F-secure as stated by the by-line of the article so he is qualified to write the article.
Accurate: This information is trustworthy because it has a high ranking official on the
subject and a lot of the information talked about in the article can be traced back to other
sources.
Alexander Carter
Information Literacy Assignment

2

Purpose: This is a solely objective article that was written to inform readers of the
hacking dangers of the past, present, and future in various technological scenarios from
bank accounts to home computers.
5. Keywords: Cyber Security Attacks
Database: Science and Technology
Journal: Cyber-Security Threats Rise in Frequency, Complexity
Journal: System Impact Characteristics of Cyber
Services, Security Mechanisms, and Attacks
with Implications in Cyber System
Survivability
6. The database articles were harder to access because of the sheer quantity of journal
articles available on cyber security attacks. But just like the internet articles, they were up
to date being no older than a year old. The authors of the database journals didnt specify
how they were qualitied to write on this topic unlike the internet article Cyber Attacks
that gave specific details on the author to show that he was an authority on the subject.
Overall the internet articles were much easier to access since the search engine provided
some of the best sources first.

Alexander Carter
Information Literacy Assignment

3


Bibliography (APA Format)

Hypponen, M. (2014, July 10). Cyber Attacks. Retrieved September 20, 2014
Schechter, E. (2014, September 15). Crime Ring Revelation Reveals Cybersecurity Conflict of Interest.
Retrieved September 20, 2014
Smith, G. (2014, September 18). Home Depot Admits 56 Million Payment Cards At Risk After Cyber
Attack. Retrieved September 20, 2014
Eddy, N. (2014). Cyber-Security Threats Rise in Frequency, Complexity. Eweek, 2.
Ye, N., Aranda, B., & Hurley, P. (2013). System impact characteristics of cyber services,
security mechanisms, and attacks with implications in cyber system survivability. Information
Knowledge Systems Management, 12(1), 75-95. doi:10.3233/IKS-130217

S-ar putea să vă placă și