Documente Academic
Documente Profesional
Documente Cultură
Caitlin Farrell
1. Obama pitches cybersecurity to Silicon Valley
2. Summary:
President Barack Obama assembled a Silicon Valley strategy session in
Palo Alto California, Friday February 13 2015. CEO's and leaders of major
companies such as Visa, Walgreens, Google, Apple, and Facebook were
invited, though some sent top network security personnel in their place.
The session was in regards to the rising fear of Americans personal
information being hacked after several major hacking incidents occurred
this past year. Most notable was the Sony Pictures hack from North Korea,
according to the United States Government. Obama hopes to successfully
share information between the government and large companies when
information is compromised following a security breach
3. Two Additional Internet Articles:
Google: We Need a Manhattan Project for Cyber Security
Bing: Capgemini bolsters security for IoT, analytics and Cloud
Keywords: Technology, Security
Search Engines Used: Google.com, Bing.com
I found the search engines to be similar in speed and results.
Bing.com and Google.com displayed many of the same articles
when I searched the keywords. For example the first article result
for both search engines was from thehuffingtonpost.com which was
the first additional source I listed.
4. TRAAP your sources:
Time: It was posted on 02/23/2015 6:58 pm EST. Yes the article was
updated at 02/23/2015 10:59 pm EST
Relevance: This article was extremely relevant to my search. Though
discussed a different aspect of illegal use of internet and security in
the form of hacking and penetrated credit accounts.
Authority: I do believe that the author of this article is qualified to
write about this topic. The author is Marc Goodman who has a career
in both law enforcement and technology. This allows him to see all
aspects of cyber security.
Accurate: The information does seem to be trustworthy; the article is
published on a very well-known and reputable newspaper website,
The Huffington Post. It is supported by evidence he refers to many
cyber security events and also directly quotes the President and
aspects of the Manhattan project that would be essential for our cyber
security.
Purpose: This article seemed to have two purposes, to inform the
reader of our cyber security weaknesses and to persuade a reform in
1