abstract and annotated bibliography

Post on 18-Jul-2016

27 Views

Category:

Documents

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

Abstract and Annotated Bibliography for Research Essay

TRANSCRIPT

Abstract:

Technology is involved with most of what we do every single day. Millions of people in

the United States have cell phones, computers, and internet access. We also own devices that are

connected to computers, such as cars or credit cards. With the widespread use of technology,

however, we are exposed to new threats, risks, and vulnerabilities like never before. We face the

threats of hackers and cyber-attacks through almost every device that we own. These

vulnerabilities pose intriguing questions about our safety as individuals. What kind of specific

threats do we face? How is our government protecting us from these threats? What more does the

government need to do in order to ensure our protection from threats and risks? In this essay, we

will look deeper into the risks that we are exposed to from our dependence on technology, and

we will turn to the government for protection from these vulnerabilities.

Works Cited

Ainsworth Vincze, Cameron. "The Coffee Shop Hackers.(TECHNOLOGY)." Maclean's 123.46

(2010): 34.

This article in a reputable Canadian newspaper explains the vulnerability of citizens as they

use the internet in coffee shops. Internet access leaves people vulnerable to being hacked.

With a “browser plug-in tool called Firesheep,” hackers can easily access citizen’s accounts

and information by being on the same network as them, like in a coffee shop (1). The author

shows citizens how easy it is for them to be hacked and how vulnerable they are to such

threats. The arguments made about the ease of hacking is clearly seen through the Firesheep

plug-in. In addition to the explanation of Firesheep, author Cameron Ainsworth-Vincze

further explains the increase in cybercrime against individuals. This source will work with

other sources to provide yet another example of the ease of hacking and how at-risk citizens

are. Although the article is short in length, it should be useful in explaining the

vulnerabilities that we face, such as at a coffee shop.

Chen, Thomas. Cyber Terrorism After STUXNET. Dept. of the Army, 2014.

Cyber Attack is the Government Safe? : Hearing before the Committee on Governmental Affairs,

United States Senate, One Hundred Sixth Congress, Second Session, March 2, 2000., 2000.

Cyber Insecurity Hackers are Penetrating Federal Systems and Critical Infrastructure : Hearing

before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology

of the Committee on Homeland Security, House of Representatives, One Hundred Tenth

Congress, First Session, April 19, 2007., 2009.

This source is a government hearing on threats to cybersecurity with regards to federal

systems. The statements are meant to argue that the government is not safe to cyber-attacks.

The speakers are experts in their field that almost all currently hold government positions.

They are speaking to a subcommittee, arguing the vulnerabilities of government and private

computer systems to hacking. The purpose of the hearing is to point out the flaws of

technological government systems currently in place. The argument is that several areas of

technology in the government have low levels of security, and security in those areas must

be updated for protection from hacking and cyber-attacks. This source connects with two of

my other sources that are government programs, as this source assesses the effectiveness of

those government programs, US-CERT and FISMA. This hearing will be very useful in my

argument on whether or not the government is safe technologically. This hearing discusses

that the government is not safe, citing specific examples where government systems have

been hacked into.

Droege, Cordula. "Get Off My Cloud: Cyber Warfare, International Humanitarian Law, and the

Protection of Civilians." International review of the Red Cross 94.886 (2012): 533-78.

In this article in in the summer 2012 International Review of the Red Cross, journalist

Cordula Droege discusses cyber security, cyber warfare, and international humanitarian law

in relation to cyber warfare. Cyber warfare is looked at with regards to international

humanitarian law in this article. Different actions have been taken by the United States and

others to help protect themselves from cyber warfare. The article goes on to discuss the risk

that civilians face due to potential attackers. This article connects with several other articles

that talk about the safety of the United States government and the potential risks that they

face along with the level of security that they have regarding cyber-attacks. The article adds

to the topic due to its specific humanitarian concerns. It will be very useful in discussing

further steps that the government must take to protect itself and its citizens from cyber-

attacks, and why the government much be protected in the first place.

Greenberg, Andy. "Digital Carjackers.(Charlie Miller and Chris Valasek Testing Cars' Security

Vulnerabilities)(Technology / Security)." Forbes 192.2 (2013): 44.

This article from Forbes magazine shows how easy it is for hackers to break into and control

may aspects of a car. As they experiment in South Bend, Indiana, journalist Andy

Greenberg brings two hackers with him, and the hackers show what they can control, aimed

to inform the public of these gaping holes in security. Although it is just meant for research

purposes, it shows the dangers of having so many computers in cars. The hackers could

control several aspects of the vehicle, such as its breaks, horn, engine, and headlights.

Although they hacked the car in person, it is already known that this can be done wirelessly

(1). This source will provide a useful example of the vulnerability that individuals face

because of dependence on technology. Cars are now another area that can be hacked into

and controlled by others, leaving individuals at great risk, which supports my argument.

"GSM Networks Vulnerable to Hacking: Researcher." Information Company (2011).

Schell, Bernadette Hlubik, and Clemens Martin. Cybercrime: A Reference Handbook. Santa

Barbara: ABC-CLIO, 2004.

Social Security Numbers Internet Resellers Provide Few Full SSNs, but Congress should

Consider Enacting Standards for Truncating SSNs : Report to Congressional Requesters.,

2006.

This source is a report by the United States Government Accountability Office. The GAO

set out to find how easy it was to find people’s social security numbers from internet

resellers. Their goal was to investigate the internet resellers and the data, specifically social

security numbers, that they were able to access. In short, the study found that out of the 21

websites that they tried to buy SSNs from, they were able to receive one complete SSN and

four truncated SSNs (3). They found that there were, in fact, easy ways to access someone’s

social security number. The report also talked about ways that the government could help to

make the SSNs of people to be more secure by providing real solutions, such as standard

truncating of SSNs. This report has similar findings as other reports and articles on the ease

of access to people’s personal information. It also provides a counterargument for

government sources arguing that people’s information is secure. This source will be very

useful in analyzing the safety of people’s information and steps that the government can

take to further protect its citizens from vulnerabilities.

"US must Adopt Cyberattack Law, Says NSA Chief the US must Adopt a Law to Protect the

Country from Cyber-Attacks, the Head of the National Security Agency Said on Monday,

Insisting that it would Respect Privacy.(NEWS)." Telegraph Online (2012).

top related