My topic covers cyber-attacks on businesses.
Database: Computer Source
- Keyword: Cyberattacks.
- Results: 376 articles.
- Potential Article:
O’Flaherty, K. (2021, January 8). The nation state threat to business. ComputerWeekly.Com. https://www.computerweekly.com/feature/The-nation-state-threat-to-business
- Keyword: Cyber Terrorism.
- Results: 2, 028 articles.
- Potential Article:
GROSSE, E., SCHNEIDER, F. B., & MILLETT, L. L. (2021). Implementing Insider Defenses: How to avoid insider cyber-attacks by creating a corporate culture that infuses trust. Communications of the ACM, 64(5), 60–65. https://doi-org.ezproxy.fhsu.edu/10.1145/3418296
- Keyword: Ransomware.
- Results: 493 articles.
- Potential Article:
Yuste, J., & Pastrana, S. (2021). Avaddon ransomware: An in-depth analysis and decryption of infected systems. Computers & Security, 109, N.PAG. https://doi-org.ezproxy.fhsu.edu/10.1016/j.cose.2021.102388

Database: Computer Science Collection
- Keyword: Hacking.
- Results: 1, 187.
- Potential Article:
Udofot, M., & Topchyan, R. (2020). Factors Related to Small Business Cyber-Attack Protection in the United States. International Journal of Cyber-Security and Digital Forensics, 9(1), 12+. https://link.gale.com/apps/doc/A652011403/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=d721060c
- Keyword: Breached.
- Results: 472.
- Potential Article:
Phillips, J. T. (2002, May-June). Privacy vs. cybersecurity: the advantages of doing business over the Internet are tremendous–but only if enterprises can ensure exchanging information in cyberspace is secure. (Tech Trends). Information Management Journal, 36(3), 46+. https://link.gale.com/apps/doc/A87454388/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=3c6724ef
- Keyword: Stolen Information.
- Results: 210.
- Potential Article:
Alharbi, F. S. (2020). Dealing with Data Breaches Amidst Changes In Technology. International Journal of Computer Science and Security [IJCSS], 14(3), 108+. https://link.gale.com/apps/doc/A682507250/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=5b217e4d
Annotation:
Article:
Alharbi, F. S. (2020). Dealing with Data Breaches Amidst Changes In Technology. International Journal of Computer Science and Security [IJCSS], 14(3), 108+. https://link.gale.com/apps/doc/A682507250/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=5b217e4d
This article examines the concept of handling network breaches as technology becomes more advanced. I have seen valuable statistics and the article provides examples of how companies got hacked in this article. Another area that is excellent for me to use is the description of the types of data breaches the author explains. Data breaches including Ransomware, Denial of service, and Phishing are thoroughly explained, which will help me understand how hackers utilize these methods. Overall, the article is an excellent source to use because it can help me elaborate better on why businesses are vulnerable to cyberattacks.