Beruflich Dokumente
Kultur Dokumente
Theadora Thomas
#2
The article summarizes the development of a design called security-bydesign which is to assess threats and risk by hackers of cybersecurity before it
happens. They software is still in the early stages. Singapore is implementing this
technology in mind in order to secure their cyber systems, which in turn they hope
will help with the way they do business, how they govern their country and their
quality of life. The article provides that it is better to have a security system in
place that is cost effective, instead of waiting to implement one once the breach has
already occurred. The hope is that by creating a design for a defense infraction
with the right skill set, will allow down the road to stop anyone from hacking into
the system. This type of security design is not just about assessing threats, but also
to have an alert the intrusion before it happens.
The government is also working in conjunction with other countries to
develop agreements to put together teams to implement regulation to ensure the
countries cybersecurity well be manned with the proper testers and certifications.
The type of security design that the article talked about will be available for all in
that country. Cybersecurity issues are not just limited to the countries mentioned
here but it is a threat all. China too is implementing technology to stop cyber
hackers from entering their system through back door approaches. They are
making cyber security a priority. These issues are affecting everyone individually
as well as companies large and small. This problem can cost companies millions
of dollars in an effort to stop the hacking through cyber security.
Information Literacy
Theadora Thomas
#3.
The other two search engines I used were Bing and Google.
In comparison both search engine was less desirable that the recommend
sites given. Bing was easier to navigate to find the article relating articles about
Cybersecurity in Singapore.
I then used Google, this had more information and harder and more difficult
to navigate in finding article that was similar or comparable. I did eventually find
small article but it was more time consuming.
I would have to say that Bing was better, because it took less time to find the
information I was looking for.
Information Literacy
Theadora Thomas
#4 TRAAP
1.
2.
3.
4.
5.
Information Literacy
Theadora Thomas
#5
Key words used were:
Cybersecurity (scholarly)
Scholarly articles on cybersecurity
The database was
Articles database
Opposing viewpoints
The reason I chose those was because it was difficult to find any article that were
scholarly review on the ccbc library website that was within a 30 day timeframe.
There were articles but they were older.
Information Literacy
Theadora Thomas
#6
The internet articles was by far easier to locate and for being written within
30-day timeframe. As far as the articles on the ccbc library website, there were
many of cybersecurity, but one of the topic I originally started with. Some of the
articles were timely as to the data they provide and some were past time, giving
you data that had already occurred but because of it allowed them to implement
better security system on the computers. Most of the authority were proven by
research, trial and error and governmental agencies (i.e. homeland security, U.S.
Military etc.)
Information Literacy
Theadora Thomas
#7
Bibliography
Singapore Urges Nation to adopt security-by-design, Security, 6 Oct. 2015. Eileen Yu.
U.S., China Talks On Cybersecurity To Be A 'Very Complicated Negotiation'. All Things
Considered 24 Sept. 2015. Opposing Viewpoints in Context. Web. 17 Oct. 2015.
Out Of The Shadows, China Hackers Turn Cyber Gatekeepers. YaleGlobal
Online (2015).Opposing Viewpoints in Context. Web. 17 Oct. 2015.
Singapores Cyber Security Agency inks MOUs with the private Sector, 6 Oct. 2015. Lisabel
Ting.
New Partnerships to Boost Singapores Cyber Security, 6, Oct. 2015. Deb Wong.