Anonymous Hackers Target U.S. Security Annotated Bibliography

PAGES
2
WORDS
752
Cite

A few of the most notable include: social networking / fake emails and cloud computing. The information from this source is useful, as it is illustrating the current challenges facing the database security of most organizations. (Kark, 2011) Olzak, T. (2008). Five Steps to Protect Mobile Devices. Tech Republic. Retrieved from: http://www.techrepublic.com/blog/security/five-steps-to-protect-mobile-devices-anywhere-anytime/529

The article that was written by Olzak (2008), is talking about specific tools for protecting mobile devices. These include: storing information that is absolutely necessary, protecting the database when it is accessed over public networks, configuring devices to block external spying and encrypting sensitive information. This information is useful, because it is showing how organizations must utilize specific steps to safeguard against new vulnerabilities. (Olzak, 2008)

Tanzy, B. (2011). Security Strategy. Silicon.com. Retrieved from: http://www.silicon.com/technology/security/2011/05/12/security-strategy-staff-smartphones-ring-the-changes-39747388/

The article that was written by Tanzy (2011), is discussing the challenges associated with cloud computing and accessing information from databases remotely. This is causing most it personnel to have a lax sense of security about the possibility of breaches occurring from changing protocols. To prevent this, the author recommends creating an atmosphere that is compliance...

...

The information from this source is useful in highlighting the current challenges and possible solutions for dealing with them.
Reference

Anonymous Hackers Target U.S. Security Think Tank. (2011). Newsday. Retrieved from: http://www.newsday.com/business/technology/anonymous-hackers-target-us-security-think-tank-1.3411610

Department of Defense Strategy for Operating in Cyber Space. (2011). U.S. Department of Defense. Retrieved from: http://www.defense.gov/news/d20110714cyber.pdf

Targeted Cyber Attacks Rise. (2011). Fox News. Retrieved from: http://www.foxnews.com/scitech/2011/04/05/targeted-cyber-attacks-rise-2011-security-experts-say/

Coleman, K. (2011). Digital Conflict. Defense Systems. Retrieved from: http://defensesystems.com/blogs/cyber-report/2011/09/cyberattacks-on-mobile-devices.aspx

Kark, K. (2011). Foresters 2011 Security Strategy. CS Online. Retrieved from: http://www.csoonline.com/article/657814/forrester-s-2011-security-strategy-recommendations

Olzak, T. (2008). Five Steps to Protect Mobile Devices. Tech Republic. Retrieved from: http://www.techrepublic.com/blog/security/five-steps-to-protect-mobile-devices-anywhere-anytime/529

Tanzy, B. (2011). Security Strategy. Silicon.com. Retrieved from: http://www.silicon.com/technology/security/2011/05/12/security-strategy-staff-smartphones-ring-the-changes-39747388/

Sources Used in Documents:

Reference

Anonymous Hackers Target U.S. Security Think Tank. (2011). Newsday. Retrieved from: http://www.newsday.com/business/technology/anonymous-hackers-target-us-security-think-tank-1.3411610

Department of Defense Strategy for Operating in Cyber Space. (2011). U.S. Department of Defense. Retrieved from: http://www.defense.gov/news/d20110714cyber.pdf

Targeted Cyber Attacks Rise. (2011). Fox News. Retrieved from: http://www.foxnews.com/scitech/2011/04/05/targeted-cyber-attacks-rise-2011-security-experts-say/

Coleman, K. (2011). Digital Conflict. Defense Systems. Retrieved from: http://defensesystems.com/blogs/cyber-report/2011/09/cyberattacks-on-mobile-devices.aspx
Kark, K. (2011). Foresters 2011 Security Strategy. CS Online. Retrieved from: http://www.csoonline.com/article/657814/forrester-s-2011-security-strategy-recommendations
Olzak, T. (2008). Five Steps to Protect Mobile Devices. Tech Republic. Retrieved from: http://www.techrepublic.com/blog/security/five-steps-to-protect-mobile-devices-anywhere-anytime/529
Tanzy, B. (2011). Security Strategy. Silicon.com. Retrieved from: http://www.silicon.com/technology/security/2011/05/12/security-strategy-staff-smartphones-ring-the-changes-39747388/


Cite this Document:

"Anonymous Hackers Target U S Security" (2012, January 21) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/anonymous-hackers-target-us-security-53719

"Anonymous Hackers Target U S Security" 21 January 2012. Web.20 April. 2024. <
https://www.paperdue.com/essay/anonymous-hackers-target-us-security-53719>

"Anonymous Hackers Target U S Security", 21 January 2012, Accessed.20 April. 2024,
https://www.paperdue.com/essay/anonymous-hackers-target-us-security-53719

Related Documents

As most users, are averaging about three hours a day conducting a wide variety activities. It is at this point that hackers can be able to penetrate these vulnerabilities to use them as a backdoor inside a company's database. Once this occurs, is when there is the possibility that the situation will become worse as more criminals will utilize this as an easy way to overcome the challenges of

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Balancing National Security and Internet Freedom Balancing Freedom The Four Factions of the National Debate This paper analyses the dueling philosophies of the pro-National Security vs. pro-Internet Freedom debate that has been a hot topic since the uprisings of the Arab Spring in January of 2011. On one side of the debate are the cyber security agencies, and the media property organizations that represent Hollywood; on the other are piracy advocates worldwide, along

Computer Security Over the last several years, cyber attacks have been continually rising. This is in response to emerging threats from nations such as China who are increasing their attacks on government and military installations. According to James Clapper (the Director of National Intelligence) these threats have become so severe that they are surpassing terrorism as the greatest challenge facing the nation. To fully understand what is occurring requires focusing on

Wikileaks "If I had to choose between government without newspapers, and newspapers without government, I wouldn't hesitate to choose the newspapers." Thomas Jefferson Founded in 2006, WikiLeaks is a non-profit organization that publishes submissions of private, secret, and classified media from anonymous news sources and news leaks. Recently, the site has been responsible for publishing a multitude of military intelligence as well as diplomatic cables. For example, the Wikileaks Iraq War Logs showed