Vous êtes sur la page 1sur 2

Morgan Jones

CSIT 101
Assignment 1


1
P a g e 1 | 2



1. The article discusses the major hack that breached Home Depot between April and September
which put 56 million cards at risk. Purchases that were made in Mexico or online were not
affected and there is still no proof that debit card holders personal ID were taken. After doing
their own investigation, Home Depot, becoming one of the hardest hit retailers, found out that
the hacker used software that was custom made to rid of being caught. The hack hasnt hurt the
company that much - except for the $62 million in recover fees - and in fact they stated that
their share profit went up to $4.54 and still expects their regular profit to go up 4.8%. Target on
the other hand suffered more with 40 million cards hit and a decrease in sake by.
2. Google VS. Bing: Between these two search engines I found both of them helpful and useful but
I went with Bing in the end. When I typed in "credit card security" in the searches, Google gave
me more companies than articles and because it was articles on credit card security that I was
looking for I went with Bing because it gave me that plus breaking news on the subject.
3. TRAAP
I. Time: January 28, 2014
II. Relevance: This does relate to my topic because my main article was about security
cards being breached and this article discusses increasing credit card security.
III. Authority: The author is Tom Groenfeldt and qualified to write to write about this
article.
IV. Accurate: This article is trustworthy because it includes real experiences related to the
issue at hand and even offers an outside link.
V. Purpose: The purpose of the article was to notify card holders of a possible change that
might happen to their credits to make them more secure but might also make it a little
more costly for the companies.
4. Keywords: technology security, computer security
Basic Search
5. When looking for and finding the internet and journal articles I found major differences. When it
came to using the search engines if found it way easier to get to what I was looking for and was
able access what I needed to. On the other hand the database on the CCBC library was harder
and much more work to filter through. Both of my articles found online were made within the
past year yet the scholarly journals were mad in 2000 and 2013. The scholarly journals on the
database are already authentic. To find out if the articles found on Bing were took a little
digging.
6. MLA Format:
Morgan Jones
CSIT 101
Assignment 1


2
P a g e 2 | 2

I. Townsend, Matt. "Home Depot Says Data Hack Affected 56 Million Payment Cards."
Bloomberg.com. Bloomberg, 18 Sept. 2014. Web. 21 Sept. 2014.
II. Groenfeldt, Tom. "American Credit Cards Improving Security With EMV, At Last." Forbes.
Forbes Magazine, Jan.-Feb. 2014. Web. 21 Sept. 2014.
III. Lawrence, Dune. "Hack-Resistant Credit Cards Bring More Safety-at a Price." Bloomberg
Business Week. Bloomberg, 14 Feb. 2014. Web. 21 Sept. 2014.
IV. Gurpreet Dhillon and James Backhouse. "Information System Security Management in
the New Millennium." Communication of the ACM, 1 July 2000. Web.
V. Desai, Deven. "Beyond Location: Data Security in the 21st Century." Communication of
the ACM 56.1 (January 2013): 34-36. Print.

Vous aimerez peut-être aussi