Narrowing it Down to the Specifics

Advanced Searches

  • Database: Computer Science Collection
    • Boolean term: Cybersecurity and Cyberattacks
      • Limiters: Academic Journals, Full-Text Documents, Peer-Reviewed Journals, Publication Date Apr 06,2017 – April 06, 2022.
      • Results: 158
      • Potential Article: Alqahtani, M. A. (2022). Cybersecurity Awareness Based on Software and E-mail Security with Statistical Analysis. Computational Intelligence and Neuroscience, 2022. https://link.gale.com/apps/doc/A698473867/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=494e0159. Accessed April 6, 2022. https://link.gale.com/apps/doc/A698238142/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=05d816ca
    • Annotation: Alqahtani, M. A. (2022). Cybersecurity Awareness Based on Software and E-mail Security with Statistical Analysis. Computational Intelligence and Neuroscience, 2022. https://link.gale.com/apps/doc/A698473867/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=494e0159 Accessed April 6, 2022. https://link.gale.com/apps/doc/A698238142/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=05d816ca
      • This article covers a survey containing 11 questions related to cybersecurity distributed to university students. Network security is based on your cybersecurity awareness. Security vulnerabilities pose a danger to organizations’ ability to circumvent cyber-attacks. The cybersecurity of the company is impacted by every individual who has a connection to the internet (Materials and Methods).

 

  • Database: Computer Science Collection
  • Boolean Term: Cyberattacks not Cybercrime
    • Limiters: Academic Journals, Full-Text Documents, Peer-Reviewed Journals, Publication Date Apr 06,2017 – April 06, 2022, subject: Data Security”.
    • Results: 59
      • Potential Article: Zrahia, Aviram. “Threat intelligence sharing between cybersecurity vendors: Network, dyadic, and agent views.” Journal of Cybersecurity, vol. 4, no. 1, Mar. 2018, pp. 1g+. Gale OneFile: Computer Science, link.gale.com/apps/doc/A607390910/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=e720f6b4. Accessed 6 Apr. 2022.

 

    • Annotation: Zrahia, Aviram. “Threat intelligence sharing between cybersecurity vendors: Network, dyadic, and agent views.” Journal of Cybersecurity, vol. 4, no. 1, Mar. 2018, pp. 1g+. Gale OneFile: Computer Science, link.gale.com/apps/doc/A607390910/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=e720f6b4. Accessed 6 Apr. 2022. https://link.gale.com/apps/doc/A607390910/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=e720f6b4
      • This article covers sharing intelligence between security vendors becomes the means to overcome this catch-22 scenario (2) and could partially explain why sharing companies are ranked higher for innovation and success (Intro paragraph).

 

  • Database: Ebsco: Computer Source
    • Boolean term: Computer Security or cybersecurity
      • Limiters: Full Text, Peer-Reviewed, Publication Date 1/2018 – 12/22, Language: English, Publication: International Journal of Information Security
      • Subject Terms: INTERNET security
        CYBERTERRORISM
        CYBER intelligence (Computer security)
        SECURITIES analysts
        INFORMATION visualization
        COMPUTER crime prevention
        INFORMATION technology security
      • Results: 59
      • Potential Article: Schlette, D., Böhm, F., Caselli, M., & Pernul, G. (2021). Measuring and visualizing cyber threat intelligence quality. International Journal of Information Security, 20(1), 21–38. https://doi-org.ezproxy.fhsu.edu/10.1007/s10207-020-00490-y. Accessed April 6, 2022.
    • Annotation: Schlette, D., Böhm, F., Caselli, M., & Pernul, G. (2021). Measuring and visualizing cyber threat intelligence quality. International Journal of Information Security, 20(1), 21–38. https://doi-org.ezproxy.fhsu.edu/10.1007/s10207-020-00490-y.
      • This article covers the timely exchange of high-quality CTI is crucial for the effort of organizations to prevent cyber security breaches (Motivational Example).

        mohamed_hassan / Pixabay

About Heath

This is my second semester attending FHSU online classes. I am a Junior at FHSU and hope to get my Degree in Cyber Security. I enjoy playing video games with friends on Xbox One, fixing and building things, and hanging out with my cat, Thunder.

Leave a Reply

Your email address will not be published. Required fields are marked *