Sie sind auf Seite 1von 6

Information Literacy

Theadora Thomas

#2
The article summarizes the development of a design called security-bydesign which is to assess threats and risk by hackers of cybersecurity before it
happens. They software is still in the early stages. Singapore is implementing this
technology in mind in order to secure their cyber systems, which in turn they hope
will help with the way they do business, how they govern their country and their
quality of life. The article provides that it is better to have a security system in
place that is cost effective, instead of waiting to implement one once the breach has
already occurred. The hope is that by creating a design for a defense infraction
with the right skill set, will allow down the road to stop anyone from hacking into
the system. This type of security design is not just about assessing threats, but also
to have an alert the intrusion before it happens.
The government is also working in conjunction with other countries to
develop agreements to put together teams to implement regulation to ensure the
countries cybersecurity well be manned with the proper testers and certifications.
The type of security design that the article talked about will be available for all in
that country. Cybersecurity issues are not just limited to the countries mentioned
here but it is a threat all. China too is implementing technology to stop cyber
hackers from entering their system through back door approaches. They are
making cyber security a priority. These issues are affecting everyone individually
as well as companies large and small. This problem can cost companies millions
of dollars in an effort to stop the hacking through cyber security.

Information Literacy
Theadora Thomas
#3.
The other two search engines I used were Bing and Google.
In comparison both search engine was less desirable that the recommend
sites given. Bing was easier to navigate to find the article relating articles about
Cybersecurity in Singapore.
I then used Google, this had more information and harder and more difficult
to navigate in finding article that was similar or comparable. I did eventually find
small article but it was more time consuming.
I would have to say that Bing was better, because it took less time to find the
information I was looking for.

Information Literacy
Theadora Thomas
#4 TRAAP
1.
2.
3.
4.

5.

October 6, 2015. It has not been updated.


Yes.
Lisabel Ting and Eileen Yu. Both the above journalist have written articles
on these subjects and other. I reached their credentials.
Yes, it is. It is supported by evidence. Yes, it has as stated the Journalists
have written article not only the subject matter that I am writing about but
also on the cost accrued by organizations when their cyber security has been
threatened.
The article has been written to inform the people of the threats that exist
within cybersecurity, and not so much to persuade but to make us more
aware of the imminent threat that cybersecuity if not taken seriously can
have on our lives.
There isnt any bias that I can detect from reading the various articles, the
materials is to inform and to be mindful of what has happened, what can
potentially happen and the advantage of having such a defense in place to
detect the intrusion of hackers before it actually happens. Once it happens
all types of information are available that can be used against the
organization and/or individuals.

Information Literacy
Theadora Thomas
#5
Key words used were:
Cybersecurity (scholarly)
Scholarly articles on cybersecurity
The database was
Articles database
Opposing viewpoints
The reason I chose those was because it was difficult to find any article that were
scholarly review on the ccbc library website that was within a 30 day timeframe.
There were articles but they were older.

Information Literacy
Theadora Thomas
#6
The internet articles was by far easier to locate and for being written within
30-day timeframe. As far as the articles on the ccbc library website, there were
many of cybersecurity, but one of the topic I originally started with. Some of the
articles were timely as to the data they provide and some were past time, giving
you data that had already occurred but because of it allowed them to implement
better security system on the computers. Most of the authority were proven by
research, trial and error and governmental agencies (i.e. homeland security, U.S.
Military etc.)

Information Literacy
Theadora Thomas
#7
Bibliography
Singapore Urges Nation to adopt security-by-design, Security, 6 Oct. 2015. Eileen Yu.
U.S., China Talks On Cybersecurity To Be A 'Very Complicated Negotiation'. All Things
Considered 24 Sept. 2015. Opposing Viewpoints in Context. Web. 17 Oct. 2015.
Out Of The Shadows, China Hackers Turn Cyber Gatekeepers. YaleGlobal
Online (2015).Opposing Viewpoints in Context. Web. 17 Oct. 2015.
Singapores Cyber Security Agency inks MOUs with the private Sector, 6 Oct. 2015. Lisabel
Ting.
New Partnerships to Boost Singapores Cyber Security, 6, Oct. 2015. Deb Wong.

Das könnte Ihnen auch gefallen