Documente Academic
Documente Profesional
Documente Cultură
CSIT 101
9/30/15
Information Literacy
1&2
This article about internet security provides ten tips from experts in the field. Some some tips
include not using default passwords because it;s easier for hackers to get your personal information.
Following simple security protocols such having a strong password and not allowing source codes to be
embedded so no one can get access to them. Also making sure your mobile security is well protected
because with the amount of potability and convenience of mobile data is is easier for the bad guys to
get your information. Following these ten easy steps could help protect almost any one when it comes t
internet security.
3
Google
"Study Names the Five Most
Hackable Vehicles."
Bing
I generally use Google as my search engine, but as I searched between these two sites I noticed
Bing had better results when it came to this search. They both were fast, but I had to scroll down a little
more with Google to find a decent article, which isn't bad but I did not have to do that with Bing.
Kenny Davis
CSIT 101
9/30/15
Information Literacy
4
"Chinese Official Faults U.S. Internet Security Policy."
5
The key words I used to find these two journals were just Internet Security. I used the smart
search database on the CCBC library website. I also limited my search to only Scholarly (peer
Reviewed) Journals. I filtered my source types to only Journal articles so I can get a better refined
search. I kept the dates between 2015-2016, and searched between the month of September, 2015 to
keep the dates up to date and current.
Kenny Davis
CSIT 101
9/30/15
Information Literacy
The first article on the ten tips on internet security was easy to find on the CCBC smart search
database and easily accessible. The article is currently up to date and and is from a very reputable
source (SDM: Security Distributing & Marketing. Sep2015, Vol. 45 Issue 9, p70-70. 2/3p.). The first
Journal about Advance security policies was also very easy to find, a little more work was needed but
was still quite a simple task. I used the same tactics as the Article to find the date and time period for
the journal. The journal is also from a very reputable source (International Journal of Advanced
Research in Computer Science; Jul/Aug2015, Vol. 6 Issue 6, p47-49, 3p).
Kenny Davis
CSIT 101
9/30/15
Information Literacy