Quest for Cyberattack Articles

My topic covers cyber-attacks on businesses.

Database: Computer Source

  • Keyword: Cyberattacks.
  • Results: 376 articles.
  • Potential Article:

O’Flaherty, K. (2021, January 8). The nation state threat to business. ComputerWeekly.Com. https://www.computerweekly.com/feature/The-nation-state-threat-to-business

  • Keyword: Cyber Terrorism.
  • Results: 2, 028 articles.
  • Potential Article:

GROSSE, E., SCHNEIDER, F. B., & MILLETT, L. L. (2021). Implementing Insider Defenses: How to avoid insider cyber-attacks by creating a corporate culture that infuses trust. Communications of the ACM64(5), 60–65. https://doi-org.ezproxy.fhsu.edu/10.1145/3418296

  • Keyword: Ransomware.
  • Results: 493 articles.
  • Potential Article:

Yuste, J., & Pastrana, S. (2021). Avaddon ransomware: An in-depth analysis and decryption of infected systems. Computers & Security109, N.PAG. https://doi-org.ezproxy.fhsu.edu/10.1016/j.cose.2021.102388

Tumisu / Pixabay

Database: Computer Science Collection

  • Keyword: Hacking.
  • Results: 1, 187.
  • Potential Article:

Udofot, M., & Topchyan, R. (2020). Factors Related to Small Business Cyber-Attack Protection in the United States. International Journal of Cyber-Security and Digital Forensics9(1), 12+. https://link.gale.com/apps/doc/A652011403/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=d721060c

  • Keyword: Breached.
  • Results: 472.
  • Potential Article:

Phillips, J. T. (2002, May-June). Privacy vs. cybersecurity: the advantages of doing business over the Internet are tremendous–but only if enterprises can ensure exchanging information in cyberspace is secure. (Tech Trends). Information Management Journal36(3), 46+. https://link.gale.com/apps/doc/A87454388/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=3c6724ef

  • Keyword: Stolen Information.
  • Results: 210.
  • Potential Article:

Alharbi, F. S. (2020). Dealing with Data Breaches Amidst Changes In Technology. International Journal of Computer Science and Security [IJCSS], 14(3), 108+. https://link.gale.com/apps/doc/A682507250/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=5b217e4d

Annotation:

Article:

Alharbi, F. S. (2020). Dealing with Data Breaches Amidst Changes In Technology. International Journal of Computer Science and Security [IJCSS], 14(3), 108+. https://link.gale.com/apps/doc/A682507250/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=5b217e4d

This article examines the concept of handling network breaches as technology becomes more advanced. I have seen valuable statistics and the article provides examples of how companies got hacked in this article. Another area that is excellent for me to use is the description of the types of data breaches the author explains. Data breaches including Ransomware, Denial of service, and Phishing are thoroughly explained, which will help me understand how hackers utilize these methods. Overall, the article is an excellent source to use because it can help me elaborate better on why businesses are vulnerable to cyberattacks.

About Peyton Rohan

I graduated from Eastland High School in the year 2020. Throughout High School, I have always been on the A honor roll. Throughout High School, I played a variety of sports such as basketball, football, golf, and track. My greatest interest was watching and playing basketball. I started my attendances at Fort Hays State University during the fall of 2020 and have been on the Dean's Honor Roll for the past two semesters. I now plan on graduating from Fort Hays State University during the year 2023 with a Bachelor of Computer Networking and Telecommunications degree that mainly focuses on Cybersecurity. I would say throughout the years of my education is that I am a persistent and hard worker, who gets assignments and projects done.

Leave a Reply

Your email address will not be published. Required fields are marked *