Professional Documents
Culture Documents
RAMSES UJAQUE-MEDINA - P2 Outline Proposal
RAMSES UJAQUE-MEDINA - P2 Outline Proposal
I. Introduction
1. “Symantec calculated that 14 adults become the victim of a cyber attack every
second, or more than one million attacks every day” (Jang-Jaccard and Nepal
973).
2. The Internet has helped business and society flourish, but these benefits of the
attacks which use malware to carry out malicious deeds. Cybersecurity is a form
important information.
daily basis by almost everyone on Earth, so if there are issues with the security of
the Internet, everybody is at risk of having their personal information stolen for
existing cybersecurity risks, frequency of attacks, and reasons behind these threats
must be examined.
II. First source: ScienceDirect
cybersecurity, the different forms of malware, and what future research could be
low danger (Jang-Jaccard and Nepal 973). Malware is the main form of attacking,
and these systems pose a constant threat; they tend to take advantage of existing
weaknesses or make new dangers entirely (Jang-Jaccard and Nepal 974). More
every second, or more than one million attacks every day” (Jang-Jaccard and
Nepal 973). This information from a well-known source highlights how frequent
these cyberattacks are. “In June 2012, attackers compromised Distributed Denial
voicemail service” (Jang-Jaccard and Nepal 975). This attack displays an example
and cyberattacks.
data from well-known sources, and providing relevant data throughout (it
is never vague).
few biases. The statistics provide direct evidence into the issue of
academic background reduces potential bias, and the fact that the information on
this source is peer-reviewed gives the argument more reliability and makes it
more trustworthy.
information gives validity to its information, and the fact that the argument was
background reduces potential biases, and its lack of vague and unnecessary
(specifically from Iraq) cause computer problems due to poor Internet usage and how to
computers and that computer users are responsible for the risks they face
a. Computer users do not browse the Internet in a way that puts them free
of risk (Jameel 20). This lack of proper Internet usage can be linked to a lack of
These users will affect even the users who do have knowledge of good computer
usage because they are on the same domain (Jameel 25); that is why it is
important for the people to learn safe Internet browsing habits (Jameel 28).
impact the security of users as a whole, and careful experts will be affected by
default since the other types of users exist in the same domain that they work with
(Jameel 24-25). These careless and ignorant computer users cause problems for
everyone; in order to reduce these issues, users must be informed about good
institutes which have instructors who are authorized to answer any question
and professional authors” (Jameel 28). Once users learn about good Internet
problems should decrease since users will be more aware and cautious of the
insight into the Internet issues of another country and gives a different perspective
B. This source is fairly credible, but not as much as the previous one. Both sources
cybersecurity, and propose possible solutions to fix these solutions. Both sources
acknowledge the problems lying in the Internet, but the Iraq source focuses more on user
1. Both sources are credible; this source is fairly credible because it comes
from a university, and the previous source came from an academic journal.
and considers more than one factor in Internet issues (the university
2. This source is fairly strong, but not nearly as much as the previous source.
different country (this source is from Iraq, the previous one was from
causes. This source does not strengthen the argument as much as the
have that same level of trustworthiness in its research. Both sources come
from academic origins, so they both have a low chance of having bias in
their arguments. Both maintain relevance for clarity, but the lack of data
IV. Discussion of the third point of view or “next alternate perspective” about the issue
2. Internet attacks have been growing and evolving, they have increased over
recent years, and they take several forms to stay ahead of existing security
threats, and it was found that there was a significant rise in cyberattacks (Fossi et
al. 17). Threats have taken place over social media platforms, inside jobs, and
seemingly trustworthy mobile apps (Fossi et al. 17). Cyber threats have also been
evolving to avoid detection so they can steal more information from the user
before the user becomes aware of the malicious activity (Fossi et al. 13).
b. “The Internet and social networks provide rich research for tailoring an
attack...by sneaking in among our friends, hackers can learn our interests, gain our
trust, and convincingly masquerade as friends” (Fossi et al. 4). This example is
reflective of how prevalent Internet threats are by showing that not even social
media platforms are safe; hackers can just pretend to be friendly before they steal
the victim’s personal information. “In 2010, Symantec encountered more than 286
million unique variants of malware” (Fossi et al. 6). Security threats are growing
at a rapid rate, and this data is from 2010; it is likely that this number has
3. This source makes a fairly decent argument by providing a direct report rich
b. The source is strong because it has the ability to see the data
may be weakened because the source was written ten years ago,
B. This source and the previous source are similar in credibility but differ in the
information presented. Both sources present different types of Internet threats, but the
Iraqi source blames user ignorance as the cause of Internet issues (the report links
upgrading technologies to the increase in malicious attacks). The Iraqi source also
presents a solution to the problem while the report just displays the information (it does
1. Both sources are fairly credible; the previous source came from a
university, and this source came from a security company. The university
giving direct statistics (the university does not provide much statistical
data).
2. Both of the sources are roughly equal in strength. Both of these sources
looks at the issue academically while the security company reports the
issue directly and has possible business motives. The security company
strengthens the argument by showing the various types of malware and the
cover; the security company could propose solutions while the university
background, but it lacks data variety. The security company has expertise
and direct data but is limited by potential business motives. Both sources
have a limited range of information, so that can work against them
cyberattacks is one reason. The Internet, while it has been vital in the growth of
communication technologies, is rich with malware. These viruses may look trustworthy
or come from a seemingly trustworthy source, and the distinction between legitimate and
illegitimate sources gets more difficult as technology advances. Another reason is in the
and the malicious technologies to conduct attacks are also growing. Cybersecurity
measures must constantly evolve to be effective since malware is being upgraded to avoid
detection (Fossi et al. 17). The final reason is because of the ignorance of computer users.
Several computer users often do not know about the risks that they expose themselves to
on the Internet. Since these users affect everybody else on the same Internet domain, it is
important for them to learn good Internet browsing techniques (Jameel 28-29).
B. Each argument was effective in its own way. ScienceDirect was effective because
it gave an in-depth analysis of the different types of malware and how they work. The
university was effective by introducing a new point of view which acknowledged that
computer threats will always exist and blamed computer users for browsing the Internet
in a way that does not protect them from these dangers. The security company was
effective because it directly showed how severe Internet threats are by showing the
frequency of attacks. Each source provided a perspective to the issue; when considered
altogether, the arguments made were highly impactful because they show the dangers
C. More resources needed to further explore this issue. Research on the current
doing enough about Internet threats. Research on how to make a trustworthy security
system or privacy-aware system should also be considered (Jang-Jaccard and Nepal 29).
D. Nothing needs to change in how the issue is currently being discussed, but
situation.
Citations/Sources
1. Make sure you have appropriate in-text, parenthetical citations throughout paper
Works Cited
Fossi, Marc, et al. "Symantec Internet Security Threat Report Trends for 2010." Volume XVI (2011).
Jameel, Hassan Harith. "Towards A Safe Internet Usage In Iraq." Jornal of Al-Turath University
Jang-Jaccard, Julian, and Nepal, Surya. "A Survey of Emerging Threats in Cybersecurity." Journal of
Computer and System Sciences 80.5 (2014): 973-993. Accessed 16 Oct. 2021.