Professional Documents
Culture Documents
ANNOTATED BIBLIOGRAPHY
ANNOTATION
THOUGHTS/CONNECTI
ONS
The internet is
now known as
the backbone
that underpins a
prosperous
economy and a
strong military
and an open and
efficient
government
according to the
U.S. president
Barack Obama.
Bank accounts,
trade, art, music,
and news have
been more
effective than
before due to the
speed of the
internet and
telecommunicati
ons; however,
this causes the
continuity of the
same historic
problems
threats, war, and
terrorism.
Using the
internet in
modern
technologies
propaganda is
simple. Assad
along with the
Propaganda is a form of
social engineering which
in modern days can be a
double edged sword. It
can be used as a tool to
push governments to take
action or surpass its
Syrian
government
created
Instagram,
Twitter, and
YouTube to show
the glorified
Syrian state and
decorated
military.
In addition, social
media is being
used to censor
the media in by
discrediting
genuine facts
and footage.
citizens
Most people in
the US, assume
that the
government or
law enforcement
should take
control beyond
self-governance
like looking out
for your
neighbors and
yourself such as
houses are
protected with
locks and if a key
is left in a car.
However,
criminal behavior
has extended to
the internet
rather than just
private property,
it has extended
to intellectual
property.
Counter
hacking is
seemingly
increasingly hard
because the
location of the
hacker might be
faked. In
addition,
countless
hacking behavior
is done in more
complex manner
by nation-states
and foreign
governments.
Since reality is
much different
from cyberspace,
which is
supposedly a
neutral
environment
between
governments,
there is a huge
disconnect in the
laws that govern
that region;
theres no 12mile limit in
cyberspace.
N. E. Bowie and K. Jamal, "Privacy
Rights on the Internet: SelfRegulation or Government
Regulation?," Business Ethics
Quarterly, vol. 16, no. 3, pp. 323
342, Jul. 2006. [Online]. Available:
https://www.cambridge.org/core/articl
e/div-class-title-privacy-rights-on-theinternet-self-regulation-orgovernment-regulationdiv/82470263C7CB422ECC0A51FDB6
37A247.
Privacy on the
internet and the
use of
technology is
viewed at a
philosophical and
ethical level.
http://www.slideshare.net/SamsungB
usinessUSA/the-mobile-aware-cisosecurity-as-a-business-enabler.
Accessed: Dec. 15, 2016.
security when it
comes to mobility
and devices that
deals with
mobility. Speaking
in context of
simplifying,
connecting,
innovating, and
transforming. He
gave an anecdote
during his
presentation
about his wife
lecturing him
about getting
more exercise.
She found out
through his
smartwatch laying
on the table which
inevitably reveals
sensitive health
information up to
the time of day of
an activity. In
addition he gives
an example on
how mobility and
confidentiality has
worked in a
cohesive way with
the example of
airline boarding
passes being
digital with instant
changes in
detailed
information.
Rewards cards,
location
awareness, and
other retail apps
have driven
consumers to
quick access to
complex services
for less.
R. Kazanciyan, "Hunting in the dark UNC Cybersecurity symposium
2016," in Hunting in the Dark,
Speaker Deck, 2016. [Online].
Available:
https://speakerdeck.com/ryankaz/hun
ting-in-the-dark-unc-cybersecuritysymposium-2016. Accessed: Dec. 15,
2016.
Ryan Kazanciyan
is the Chief
Security
Architect for
Tantium and is
also a technical
writer for the
famous hacking
TV series Mr.
Robot and even
confirmed the
possibility of
season 4. In his
presentation
Hunting in the
Dark He
describes on a
technical level,
the tactics
hackers use to
gain access to
information and
how analysts
combat the
noise of a lot of
information to
identify threats.
Separating the
logistics of how
attackers
common
mistakes that
users and
secured sites
make to
compromise
security. And
how, you may
ask, did she
study thousands
of real passwords
without
compromising
the security of
any users? That's
a story in itself.
It's secret data
worth knowing,
especially if your
password is
123456 ...
J. Lyne, "Everyday cybercrime and
what you can do about it," Google+,
2013. [Online]. Available:
https://www.ted.com/talks/james_lyne
_everyday_cybercrime_and_what_you
_can_do_about_it#t-81545. Accessed:
Dec. 15, 2016.