1 1. Crime Ring Revelation Reveals Cybersecurity Conflict of Interest 2. Russian Internet thieves known as CyberVor stole about 500 million e-mail usernames and passwords from 420,000 web and FTP sites. Using this information they we able to attain the sensitive credentials of hundreds of millions of people. These credentials included information that could grant access to banking, social media, and investment accounts. Many businesses, especially cyber security firms, try to promote and exaggerate hacking attacks (such as the one committed by CyberVor) to increase sales. 3. Article: Home Depot Admits 56 Million Payment Cards At Risk After Cyber Attack Search Engine: Bing Article: Cyber Attacks Search Engine: Yahoo Each search engine brought about many different results but the engines themselves were very much the same at first glance. They both had advertisements and some of the same web pages so in general, I felt no real reason to say that one was better than other. 4. Cyber Attacks Time: July 10 2014 Relevance: My topic is cyber security so this article relates perfectly to my topic. Authority: The author of this article is Mikko Hypponen. He is the chief research officer of F-secure as stated by the by-line of the article so he is qualified to write the article. Accurate: This information is trustworthy because it has a high ranking official on the subject and a lot of the information talked about in the article can be traced back to other sources. Alexander Carter Information Literacy Assignment
2
Purpose: This is a solely objective article that was written to inform readers of the hacking dangers of the past, present, and future in various technological scenarios from bank accounts to home computers. 5. Keywords: Cyber Security Attacks Database: Science and Technology Journal: Cyber-Security Threats Rise in Frequency, Complexity Journal: System Impact Characteristics of Cyber Services, Security Mechanisms, and Attacks with Implications in Cyber System Survivability 6. The database articles were harder to access because of the sheer quantity of journal articles available on cyber security attacks. But just like the internet articles, they were up to date being no older than a year old. The authors of the database journals didnt specify how they were qualitied to write on this topic unlike the internet article Cyber Attacks that gave specific details on the author to show that he was an authority on the subject. Overall the internet articles were much easier to access since the search engine provided some of the best sources first.
Alexander Carter Information Literacy Assignment
3
Bibliography (APA Format)
Hypponen, M. (2014, July 10). Cyber Attacks. Retrieved September 20, 2014 Schechter, E. (2014, September 15). Crime Ring Revelation Reveals Cybersecurity Conflict of Interest. Retrieved September 20, 2014 Smith, G. (2014, September 18). Home Depot Admits 56 Million Payment Cards At Risk After Cyber Attack. Retrieved September 20, 2014 Eddy, N. (2014). Cyber-Security Threats Rise in Frequency, Complexity. Eweek, 2. Ye, N., Aranda, B., & Hurley, P. (2013). System impact characteristics of cyber services, security mechanisms, and attacks with implications in cyber system survivability. Information Knowledge Systems Management, 12(1), 75-95. doi:10.3233/IKS-130217