Verified Document

Anonymous Hackers Target U.S. Security Annotated Bibliography

A few of the most notable include: social networking / fake emails and cloud computing. The information from this source is useful, as it is illustrating the current challenges facing the database security of most organizations. (Kark, 2011) Olzak, T. (2008). Five Steps to Protect Mobile Devices. Tech Republic. Retrieved from: http://www.techrepublic.com/blog/security/five-steps-to-protect-mobile-devices-anywhere-anytime/529

The article that was written by Olzak (2008), is talking about specific tools for protecting mobile devices. These include: storing information that is absolutely necessary, protecting the database when it is accessed over public networks, configuring devices to block external spying and encrypting sensitive information. This information is useful, because it is showing how organizations must utilize specific steps to safeguard against new vulnerabilities. (Olzak, 2008)

Tanzy, B. (2011). Security Strategy. Silicon.com. Retrieved from: http://www.silicon.com/technology/security/2011/05/12/security-strategy-staff-smartphones-ring-the-changes-39747388/

The article that was written by Tanzy (2011), is discussing the challenges associated with cloud computing and accessing information from databases remotely. This is causing most it personnel to have a lax sense of security about the possibility of breaches occurring from changing protocols. To prevent this, the author recommends creating an atmosphere that is compliance...

The information from this source is useful in highlighting the current challenges and possible solutions for dealing with them.
Reference

Anonymous Hackers Target U.S. Security Think Tank. (2011). Newsday. Retrieved from: http://www.newsday.com/business/technology/anonymous-hackers-target-us-security-think-tank-1.3411610

Department of Defense Strategy for Operating in Cyber Space. (2011). U.S. Department of Defense. Retrieved from: http://www.defense.gov/news/d20110714cyber.pdf

Targeted Cyber Attacks Rise. (2011). Fox News. Retrieved from: http://www.foxnews.com/scitech/2011/04/05/targeted-cyber-attacks-rise-2011-security-experts-say/

Coleman, K. (2011). Digital Conflict. Defense Systems. Retrieved from: http://defensesystems.com/blogs/cyber-report/2011/09/cyberattacks-on-mobile-devices.aspx

Kark, K. (2011). Foresters 2011 Security Strategy. CS Online. Retrieved from: http://www.csoonline.com/article/657814/forrester-s-2011-security-strategy-recommendations

Olzak, T. (2008). Five Steps to Protect Mobile Devices. Tech Republic. Retrieved from: http://www.techrepublic.com/blog/security/five-steps-to-protect-mobile-devices-anywhere-anytime/529

Tanzy, B. (2011). Security Strategy. Silicon.com. Retrieved from: http://www.silicon.com/technology/security/2011/05/12/security-strategy-staff-smartphones-ring-the-changes-39747388/

Sources used in this document:
Reference

Anonymous Hackers Target U.S. Security Think Tank. (2011). Newsday. Retrieved from: http://www.newsday.com/business/technology/anonymous-hackers-target-us-security-think-tank-1.3411610

Department of Defense Strategy for Operating in Cyber Space. (2011). U.S. Department of Defense. Retrieved from: http://www.defense.gov/news/d20110714cyber.pdf

Targeted Cyber Attacks Rise. (2011). Fox News. Retrieved from: http://www.foxnews.com/scitech/2011/04/05/targeted-cyber-attacks-rise-2011-security-experts-say/

Coleman, K. (2011). Digital Conflict. Defense Systems. Retrieved from: http://defensesystems.com/blogs/cyber-report/2011/09/cyberattacks-on-mobile-devices.aspx
Kark, K. (2011). Foresters 2011 Security Strategy. CS Online. Retrieved from: http://www.csoonline.com/article/657814/forrester-s-2011-security-strategy-recommendations
Olzak, T. (2008). Five Steps to Protect Mobile Devices. Tech Republic. Retrieved from: http://www.techrepublic.com/blog/security/five-steps-to-protect-mobile-devices-anywhere-anytime/529
Tanzy, B. (2011). Security Strategy. Silicon.com. Retrieved from: http://www.silicon.com/technology/security/2011/05/12/security-strategy-staff-smartphones-ring-the-changes-39747388/
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now