Search 1:
- Database used: Computer Science Collection
- Boolean: Database AND cybersecurity AND protection online
- Limiter: Peer-Reviewed, Full-Text
- Results: 28
- Potential Article: Examining the costs and causes of cyber incidents
- Subject Terms: Computer crimes, Computer insurance, Data security, United States, National Institute of Standards and Technology
- Citation: Romanosky, Sasha (2016), Examining the costs and causes of cyber incidents, Journal of Cybersecurity (Vol 2., Issue 2) https://go-gale-com.ezproxy.fhsu.edu/ps/retrieve.do?tabID=T002&resultListType=RESULT_LIST&searchResultsType=SingleTab&hitCount=28&searchType=AdvancedSearchForm¤tPosition=4&docId=GALE%7CA610763496&docType=Report&sort=Relevance&contentSegment=ZCDB&prodId=CDB&pageNum=1&contentSet=GALE%7CA610763496&searchId=R7&userGroupName=klnb_fhsuniv&inPS=true
- Annotation: A deep analysis of the costs of database breaches, the Journal discusses the average cost of database breaches by comparison to budgets spent on IT departments. The findings are that the average amount spent on protecting data is usually less than the money lost during a breach, making it hard for smaller businesses to justify having an on-board IT team dedicated to preventing cyber events. As a result, the U.S. Government’s best security practices have been falling behind as it has not been easy convincing businesses to adopt them.
Search 2:
- Database used: Computer Source
- Boolean: Data protection AND cyber security AND breaches
- Limiter: Article
- Results: 100
- Potential Article: Big Data Analysis Makes Breaches a Greater Threat to Cyber-Security
- Subject Terms: DATA protection, GOVERNMENT agencies, UNITED Sates Dept. of Homeland Security, UNITED States. Federal Bureau of Investigation, NATIONAL security
- Citation: Rash, Wayne (2016), Big Data Analysis Makes Breaches a Greater Threat to Cyber-Security. eWeek 1-1 https://web-p-ebscohost-com.ezproxy.fhsu.edu/ehost/detail/detail?vid=0&sid=ed7be1a0-50a5-4b41-9b55-4c9cbf8bfb6a%40redis&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=cph&AN=113072085
- Annotation: Wayne’s article outlines the importance of protecting databases online to preserve status quo in cyber security. In the article, it demonstrates how sensitive data within these databases can be used by foreign agencies to create profiles on government employees. This helps with identity theft and breaching government institutions, which must be prevented at all cost.
Search 3:
- Database used: Computer Science Collection
- Boolean: Data breaches AND national security AND finance
- Limiter: Peer-Reviewed, Full-Text
- Results: 23
- Potential Article: Data leak, critical information infrastructure and the legal options: what does Wikileaks teach us?
- Subject Terms:Data security, information systems, leaks, national security
- Citation:Ida Madieha, Abdul Ghani Azmi, Sonny Zulhuda, Sigit Puspito Wigati Jarot (2012), Data leak, critical information infrastructure and the legal options: what does Wikileaks teach us? International Journal of Cyber-Security and Digital Forenics (Vol. 1 Issue 3)
- Annotation: In order to showcase the weakness of a national security grid, the article demonstrates how wikileaks created chaos and raised alarm. With such an organizations as wikileaks, classified documents and confidential information was able to circulate easily. Additionally, the authors go in depth on how their country, Malaysia, can stay protected from falling for the same fate.