Anonymous Hackers Target U.S. Security Annotated Bibliography

Total Length: 752 words ( 3 double-spaced pages)

Total Sources: 1+

Page 1 of 3

A few of the most notable include: social networking / fake emails and cloud computing. The information from this source is useful, as it is illustrating the current challenges facing the database security of most organizations. (Kark, 2011)

Olzak, T. (2008). Five Steps to Protect Mobile Devices. Tech Republic. Retrieved from: http://www.techrepublic.com/blog/security/five-steps-to-protect-mobile-devices-anywhere-anytime/529

The article that was written by Olzak (2008), is talking about specific tools for protecting mobile devices. These include: storing information that is absolutely necessary, protecting the database when it is accessed over public networks, configuring devices to block external spying and encrypting sensitive information. This information is useful, because it is showing how organizations must utilize specific steps to safeguard against new vulnerabilities. (Olzak, 2008)

Tanzy, B. (2011). Security Strategy. Silicon.com. Retrieved from: http://www.silicon.com/technology/security/2011/05/12/security-strategy-staff-smartphones-ring-the-changes-39747388/

The article that was written by Tanzy (2011), is discussing the challenges associated with cloud computing and accessing information from databases remotely. This is causing most it personnel to have a lax sense of security about the possibility of breaches occurring from changing protocols.

Stuck Writing Your "Anonymous Hackers Target U.S. Security" Annotated Bibliography?

To prevent this, the author recommends creating an atmosphere that is compliance orientated and focused on mitigating the losses of critical data. The information from this source is useful in highlighting the current challenges and possible solutions for dealing with them.

Reference

Anonymous Hackers Target U.S. Security Think Tank. (2011). Newsday. Retrieved from: http://www.newsday.com/business/technology/anonymous-hackers-target-us-security-think-tank-1.3411610

Department of Defense Strategy for Operating in Cyber Space. (2011). U.S. Department of Defense. Retrieved from: http://www.defense.gov/news/d20110714cyber.pdf

Targeted Cyber Attacks Rise. (2011). Fox News. Retrieved from: http://www.foxnews.com/scitech/2011/04/05/targeted-cyber-attacks-rise-2011-security-experts-say/

Coleman, K. (2011). Digital Conflict. Defense Systems. Retrieved from: http://defensesystems.com/blogs/cyber-report/2011/09/cyberattacks-on-mobile-devices.aspx

Kark, K. (2011). Foresters 2011 Security Strategy. CS Online. Retrieved from: http://www.csoonline.com/article/657814/forrester-s-2011-security-strategy-recommendations

Olzak, T. (2008). Five Steps to Protect Mobile Devices. Tech Republic. Retrieved from: http://www.techrepublic.com/blog/security/five-steps-to-protect-mobile-devices-anywhere-anytime/529

Tanzy, B. (2011). Security Strategy. Silicon.com. Retrieved from: http://www.silicon.com/technology/security/2011/05/12/security-strategy-staff-smartphones-ring-the-changes-39747388/.....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Anonymous Hackers Target U S Security" (2012, January 21) Retrieved May 9, 2024, from
https://www.aceyourpaper.com/essays/anonymous-hackers-target-us-security-53719

Latest MLA Format (8th edition)

Copy Reference
"Anonymous Hackers Target U S Security" 21 January 2012. Web.9 May. 2024. <
https://www.aceyourpaper.com/essays/anonymous-hackers-target-us-security-53719>

Latest Chicago Format (16th edition)

Copy Reference
"Anonymous Hackers Target U S Security", 21 January 2012, Accessed.9 May. 2024,
https://www.aceyourpaper.com/essays/anonymous-hackers-target-us-security-53719