Will send you the work shortly. Still working on it.
Running Head: CYBERSECURITY DISCUSSION
Cybersecurity Annotated Bibliography
Guiding research questions
1. What is cyber security?
2. How does the aspect of internet of things relate to cyber security?
3. How concerned should an average citizen be in regards to cyber security?
4. What can be done to improve on the issue of cyber security?
Armstrong, D. G., Kleidermacher, D. N., Klonoff, D. C., & Slepian, M. J. (2016). Cybersecurity
regulation of wireless devices for performance and assurance in the age of “mud
jacking”. Journal of diabetes science and technology, 10(2), 435-438.
In this article, the authors evaluate the cybersecurity regulation of wireless devices in the
health and other important industries. There is a general argument that although the federal
government continues to assure citizens of the effectiveness of their legislation and regulations,
these regulations have not been quite effective to prevent a cyber-breach. Regulations such as the
Health Insurance Portability and Accountability Act (HIPAA) for healthcare, the Payment Card
Industry security standard (PCI) for financials, and the US Federal Trade Commission (FTC)
guidance on the Internet of things (IoT) have not been quite effective in protecting the citizens
from cybersecurity threats.
Mele, C. (2018). Data Breaches Keep Happening. So Why Don’t You Do Something?. Retrieved
In this article, the author exposes the aspect of a data breach that keeps of happening in
the country and little effort to counter its occurrence. In this news article, Mele (2018) exposes
the trend of cyber threat and data breach in the country that in his perspective have become
rampant and that data security and cybersecurity experts are unable to explain instead, they are
throwing up their hands in defeat. Companies such as Under Armour, Yahoo, and Timehop
application have reported data breach that did expose not only their customer’s information but
also rendered their reputation in despair. In this article, the author recommends users to ensure
they undertake stable validation of their passwords and that developing strong passwords with
three-factor authentication could help protect the passwords further.
Dawson, M. (2018). A Brief Review of New Threats and Countermeasures in Digital Crime and
Cyber Terrorism. In Cyber Security and Threats: Concepts, Methodologies, Tools, and
Applications (pp. 173-180). IGI Global.
In this article, Dawson (2018) provides an essential review of the new threats of
cybersecurity and countermeasure in the context of digital crime and cyber terrorism. The author
agrees to the fact that cybersecurity has become the cornerstone of national security policies in
many states and countries around the world. The aspect of cybersecurity continues to draw the
attention of many stakeholders including government entities, utilities, energy markets,
regulators, and other stakeholders who have vested interest and wishes to exploit the cyber
infrastructure. The cybersecurity has become challenging to enhance due to the existence of a
variety of new tools and te...