Anda di halaman 1dari 4

Kenny Davis

CSIT 101
9/30/15
Information Literacy

1&2
This article about internet security provides ten tips from experts in the field. Some some tips
include not using default passwords because it;s easier for hackers to get your personal information.
Following simple security protocols such having a strong password and not allowing source codes to be
embedded so no one can get access to them. Also making sure your mobile security is well protected
because with the amount of potability and convenience of mobile data is is easier for the bad guys to
get your information. Following these ten easy steps could help protect almost any one when it comes t
internet security.
3
Google
"Study Names the Five Most
Hackable Vehicles."

Bing

Fast, had to scroll down o find


good article

"Chinese Official Faults U.S. Internet


Security Policy."

Fast, seen a good article as page


loaded

I generally use Google as my search engine, but as I searched between these two sites I noticed
Bing had better results when it came to this search. They both were fast, but I had to scroll down a little
more with Google to find a decent article, which isn't bad but I did not have to do that with Bing.

Kenny Davis
CSIT 101
9/30/15
Information Literacy

4
"Chinese Official Faults U.S. Internet Security Policy."

Time ~ This article was written September 29, 2015


R-elevance ~ This article relates to my topic, because it shows how important internet security is
and how it effects events all around the world.
A-uthority ~ The author is Paul Mozur a writer for the new York times and the wall street journal,
which both is a very reputable sources for information.
A-ccurate ~ The information in this article is very trustworthy mainly because the New York times
Is known for being a very trust worthy news source. Links are provided in the article
and I am not 100% positive that it has been tested for accuracy.
P-urpose ~ This article was written to inform the public about the tensions between America and
China over the policies of American online security. The article is objective and
provides opinions for each countries point of view.

5
The key words I used to find these two journals were just Internet Security. I used the smart
search database on the CCBC library website. I also limited my search to only Scholarly (peer
Reviewed) Journals. I filtered my source types to only Journal articles so I can get a better refined
search. I kept the dates between 2015-2016, and searched between the month of September, 2015 to
keep the dates up to date and current.

Kenny Davis
CSIT 101
9/30/15
Information Literacy

The first article on the ten tips on internet security was easy to find on the CCBC smart search
database and easily accessible. The article is currently up to date and and is from a very reputable
source (SDM: Security Distributing & Marketing. Sep2015, Vol. 45 Issue 9, p70-70. 2/3p.). The first
Journal about Advance security policies was also very easy to find, a little more work was needed but
was still quite a simple task. I used the same tactics as the Article to find the date and time period for
the journal. The journal is also from a very reputable source (International Journal of Advanced
Research in Computer Science; Jul/Aug2015, Vol. 6 Issue 6, p47-49, 3p).

Kenny Davis
CSIT 101
9/30/15
Information Literacy

Works cited - MLA


"10 Tips For Cyber Security." SDM: Security Distributing & Marketing 45.9 (2015): 70. Business Source Premier. Web.
30 Sept. 2015.
Mearian, Lucas. "Study Names the Five Most Hackable Vehicles."Computerworld. Computerworld, 14 Sept. 2015. Web.
30 Sept. 2015.
Mozur, Paul. "Chinese Official Faults U.S. Internet Security Policy." The New York Times. The New York Times, 29 Sept.
2015. Web. 30 Sept. 2015.
Pittalia, Prashant P.1, prashantppittalia@yahoo.com. "Advanced Security Policies To Protect The Internet Resources
Against The Cyber Attacks." International Journal Of Advanced Research In Computer Science 6.6 (2015): 47-49. Science
Full Text Select (H.W. Wilson). Web. 1 Oct. 2015.
DeNardis, Laura. "The Internet Design Tension Between Surveillance And Security." IEEE Annals Of The History Of
Computing 37.2 (2015): 72-83. Business Source Premier. Web. 1 Oct. 2015.

Anda mungkin juga menyukai