Digital Security: Annotated Bibliography

1748 Words4 Pages

Braden MacDonald
ISA 3100 Section W01
Current Topics in Digital Security
Completed on 10/21/14
Style used: MLA

By submitting this assignment, I affirm that all of the writing presented here is an original creation except where the work of others is set off as a quotation that has been properly cited or is a duly paraphrased passage that is properly cited.

Topic Number: 6
Topic: Good guys and bad guys (and bad things)
Definition & Summary: An online predator is a person who takes advantage of children and teenagers by using the anonymity of the internet to expose children to sexually explicit content, and seducing them into inappropriate relationships with the predator.
According to the U.S. Federal Bureau of Investigation, most predators dedicate a significant …show more content…

"Evolutions in Browser Security." NSS Labs. N.p., 28 Oct. 2013. Web. 19 Oct. 2014. <https://www.nsslabs.com/reports/evolutions-browser-security>.
Earle, Aaron E. Wireless Security Handbook. Boca Raton, FL: Auerbach, 2006. Http://www.infosectoday.com/. Web. 19 Oct. 2014.
McCallister, Erika, Tim Grance, and Karen Scarfone. "Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)." NIST SP 800-122, Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) (n.d.): n. pag. National Institute of Standards and Technology. Apr. 2010. Web. 19 Oct. 2014. <http://csrc.nist.gov/publications/nistpubs/800-122/sp800-122.pdf>.
Niem, Tu C. "Bluetooth And Its Inherent Security Issues." Www.sans.org. N.p., n.d. Web. 19 Oct. 2014. <http%3A%2F%2Fwww.sans.org%2Freading-room%2Fwhitepapers%2Fwireless%2Fbluetooth-inherent-security-issues-945>.
"A Parent's Guide to Internet Security." FBI. FBI, 03 June 2005. Web. 16 Oct. 2014.
Webb, Tielle. "How to Test the Validity or Authenticity of a Website." Small Business. N.p., n.d. Web. 19 Oct. 2014.

Open Document