Documente Academic
Documente Profesional
Documente Cultură
Annotated Bibliography
John Luke
Professor Malcolm Campbell
English 1103
March 12, 2016
Luke 2
Annotated Bibliography
Matthew-Daniel, Tola St. "White House Fact Sheet: Cybersecurity National Action Plan."
Online Posting. News | StaySafeOnline.org. National Cyber Security Alliance, 9 Feb.
2016. Web. 12 Mar. 2016.
This source from a reliable website pertaining to the subject of Cyber Warfare and cyber
security in general. This source primarily focuses on the details of how a recent
governmental effort was made to pave the way for better security to be established
country wide over the course of the following few years. The methods this would be
accomplished with include a raising of awareness of, a focus on privacy protection, and a
maintaining of public, economic, and national security. The Commission on Enhancing
National Cybersecurity will be established, Government IT services will be modernized
and overhauled, and over 19 billion dollars will be invested into the Cybersecurity fiscal
budget of the national government. An interesting aspect of the plan also includes a
boosting of student loan forgiveness for cybersecurity personnel entering the workforce,
thus making a form of investment into the future of cybersecurity. This is in the hopes
that a catalyst-like effect will take place, improving national cybersecurity by preparing
the workforce for the problems involved before they become problems.
This article is questionable in itself as being totally credible as it does not reference any
documents in a citations section, but it does show credentials of an organization, and the
plan itself can be found by simply looking it up in particular.
I may be using this article to show the progressive nature of America in the subject of
cyber security, but first I must do more research into the specifics of the plan that was
announced, and exactly how effectively it will legitimately be carried out.
Luke 3
Luke 4
TEDTalks: Ralph Langner - Cracking Stuxnet, a 21st-Century Cyberweapon. New York, N.Y:
Films Media Group, Feb. 2011. Web. 12 Mar. 2016.
This video from the developed and popular source of TEDTalks, examines the process
that was taken in order to find the origin and purpose of the Stuxnet virus. Ralph Langner
describes the methods and thought processes used by his team when examining the virus.
Throughout the duration of several months they looked at what was relevant to the virus
in pertinence to what information they already had on it, in order to narrow down its
purpose and its target. He describes how they knew it was intended to sabotage, it was
designed with two warheads each with their own particular targets, it was aimed at
most likely a high-value target for how sophisticated and complex the written code of the
virus was, and they knew that the target was most-likely located in Iran. Through this
knowledge he describes how they began to look for common occurrences and data in the
code that they could connect to the real world. He describes that what they found was a
directed attack at the Natanz Fuel Enrichment Plant. Further, the team was able to
connect the virus minimally to Israels Mossad, and primarily to the US. Langner
establishes that the viewpoint to be taken on this event is one of preparation. He describes
the virus as generic in its direction, and thus implies the danger that a cyber attack of such
simplistic magnitude creates.
This source is very useful due to the fact that the speaker directly worked on the Stuxnet
virus, and thus is a leading knowledge base on the subject.
I will be using the information that this source provided, and I will connect it to how
cyber warfare is becoming a new front of combat, and its implications for the future.
Luke 5
Wilson, Kelce S, and Muge A. Kiy. "Some Fundamental Cybersecurity Concepts." Ieee Access.
2 (2014): 116-124. Print.
This scholarly journal article explains some fundamental and basic concepts in
cybersecurity, and analyzes how even what was once considered wholly protected and
secure retained vulnerabilities that compromised the computing environment. A large
concept that was found to be true was that there was no one size fits all system that was
capable of complete protection of a system from attack. This article establishes a threepart system to define threat classes for computational systems. The three parts include
1.) Reverse Engineering, 2.) Tampering, and 3.) Piracy. These are defined as the three
primary methods that an attacker can use in order to assault a computational system. This
is delved into further, providing a fairly thorough understanding of the mindset of what
an attacker is aiming for when performing an attack. Overall the article points out that a
layer of security is needed for every tier of a computational system, starting with the user
access and operating system, and leading all the way into the hardware itself.
This article is very reliable and was written by two individuals who are currently and
effectively involved in the field they speak on. This article is intended for a fairly
knowledgeable audience to begin with, and builds upon this foundation.
I will most likely be using this resource to back up a description on how computers and
cyber spaces are legitimately protected. In other words, I will be using it to give a better
understanding of what it actually means to provide security for a computer system.