IT security personnel need not only know what actions we need to implement; we need to understand why we need to take them as well as any related background topics – we also need to be aware of current events as they relate to Cybersecurity
For this assignment 3 you are to pick one of the articles below and write a response to it. This is not a major writing assignment. It does not have to be long – a page should suffice. It should have a short summary of the article as well as what you take away from it. It should be written so that someone who has not read the article would understand what it is about and what your perspective is on the subject.
I’m sure I don’t have to mention, but I would be remiss if I didn’t: As with every assignment I give, do not cut and paste information from other sources – I always want your view and your words.But, I also want you to support your view with other sources (at least two in-text citations). This means you will also need an APA style reference list. A cover page is not required for this assignment. If you quote an article (or any other source) – especially if it is a direct quote, ensure you cite it properly.
Dropbox’s tool shows how chatbots could be future of cybersecurity
Yahoo Reveals Cookie Forging Activity Led to Account Breach
Bang! SHA-1 collides at 38762cf7f55934b34d179ae6a4c80cadccbb7f0a
Recent Cloud Issues Show Security Can Fail Dramatically
Clock’s ticking for MD5-signed JAR files, says Oracle
Microsoft Seeks Global Cybersecurity Accord
Cloudbleed’s silver lining: the response system worked