Bulk, Frank. "The ABCs Of WPA2 Wi-Fi Security." Network Computing, 2 Feb. 2006, p. 65. Computer Database, http://link.galegroup.com/apps/doc/A141716150/CDB?u=s 2153&sid=CDB&xid=c91ee222. Accessed 29 Nov. 2018.
This article dives deep into the world of network security protocols, outlining the differences/improvements of WPA to WPA2 security, identifies protocols ranging from AES (Advanced Encryption Standard) to PSK, PTK, and PMK protocols. The name of the article is referring to the abbreviations of all of the network security protocols. The author explains the core fundamental designs of each protocol, and then extends into some complications when retrieving server information through each protocol.
This source seems to be very reliable, because it is an excerpt from a scientific journal publications called Network Computing, by Frank Bulk. The author is well known in the computer networking field, and has continued to speak at cyber security events. This article shows no signs of bias, and makes reasonable claims while providing sufficient supporting evidence.
I will be using this article as a reference throughout the entirety of my project, because the protocols can become confusing after a while, and can be easily mixed up. This article ensures that I have the right knowledge and sufficient understanding of the way that the protocols can affect different services being completed by the network.
|
Empey, Charlotte. “Cybercriminals and the Risk to Small Business.” AVG Now, Avast Software, 28 May 2018, now.avg.com/cybercriminals-and-the-risks-to-small-business. Accessed 31 Nov. 2018.
The author of this article begins by describing what cyber criminals are, and what exactly they do. The article gave me a lot of insight on how cyber criminals operate, and why they tend to target small to medium sized businesses the most. At the end of the article, the author gave some tips for protecting yourself and your business from cyber criminal attacks.
This article gave me a lot of background information about the problem with cybercriminals and why they target small and medium businesses. The author of this information comes from a cybersecurity company attempting to market their products to small and medium sized businesses as well, so the information is a little biased in order to make sales.
This article is very useful to me as I learned a lot more about the major problem that exists with small-medium businesses’ network protection, and how cyber criminals can actually steal company information. The author also included images and other graphics that furthered my understanding of some of the operations conducted to prevent cyber attacks.
|
"Firewall offers network security for small/medium businesses." Product News Network, 14 Feb. 2008. Computer . Database, http://link.galegroup.com/apps/doc/A174746571 /CDB?u=s2153&sid=CDB&xid=3d33c881. Accessed 29 Nov. 2018.
This article dives deep into a cybersecurity product (software) that is already on the market, that is aimed at making a small business’s network more secure. The way I will be using this source is to see how other cybersecurity companies have sold their product in the past. Their product is vastly different to Wireless Defender, however, as it is a software monitoring program.
I think that this is a somewhat biased article, because the purpose for this is to sell a product. The author is affiliated with the product, so immediately it raises some red flags about the article’s credibility. However, the information is not meant to misinform the reader, but more to persuade them to buy their cyber security product.
This article is important for me because it gives me an idea on how others sell their cyber security products, especially for small to medium sized businesses. I will use this as a reference for some of the sales and marketing tactics that I use to advertise and sell my product to customers and investors.
|
Mansfield, Matt. “Cyber Security Statistics: Numbers Small Businesses Need to Know.” Small Business Trends, Name Cheap, 24 Oct. 2018, https://www.smallbiztrends.com/2017/0 1/cyber-security-statistics-small-business.html. Accessed 14 Dec. 2018.
This article provides some facts and statistics for small businesses in terms of their network security and risk factors for data breaches. This article gave me some starting points in terms of my own personal market research. These statistics reveal what type of information is commonly stolen from these businesses including employee records, intellectual information, payroll records, etc.
Most of the information seems to come from a survey of the owners of small to medium sized businesses. However, the author never explicitly discloses the source of the information and statistics, so it makes me question it’s credibility. However, the data collected does not seem unreasonable.
This article provides me a lot of information on the current problem that business owners are facing. Statistics on how many businesses are targeted, what information is stolen, as well as information on how the cyber criminal obtained the data, are all recorded and visually represented in the article through graphs.
|
"New York City Embraces Cyber Security for Public WiFi." Wi-Fi Wireless LAN, Mar. 2018, p. 1+. Computer Database, http://link.galegroup.com/apps/doc/A534958019/CDB?u=s215 3&sid=CDB&xid=e39cd017. Accessed 29 Nov. 2018.
This article discusses the new cybersecurity protocols being implemented in New York City to allow more secure connections on public hotspots. Security protocol “Quad9” will be used in addition to the WPA2 and IEEE 802.11 protocols that are currently standard in all public access points. I will be using this source as a reference to how governments manage cybersecurity, as well as understanding what network security protocols are already in place.
This article is extremely reliable, as it is from an accredited organization, the Information Gatekeepers, and was published only 9 months ago. The goal of the article was to inform the audience of new policies requiring public hotspots use the new Quad9 protocol, which is the most recent cyber security advancement.
I will be using this article as a guide as to how a security protocol works, as well as how the government addresses cyber security issues. Although this is not the first time that a new protocol was made standard through congressional action, it is surely the most recent, and has proved to be effective in New York City.
|
Westover, Brian. “Where to Place Your Router for the Best Wi-Fi Signal.” Laptop, Laptop Mag / Purch, 8 Feb. 2018, www.laptopmag.com/articles/place-router-best-wi-fi-signal.
This article highlights the different ways that the position of your wireless router can affect signal coverage and signal strength. This information will be important during the research and experimentation phase of my project, as one of the main concerns with my product is wireless coverage, so this article will give me pointers to control the range of the wireless signal.
This article was written by a technology website that profits from paid promotions of other products. This shows that the information provided may not be completely accurate, however this article never specifically mentions any product or brand names. The purpose of this article was to give the audience some tips to get the best signal coverage possible.
I will probably use this article when I am figuring out the best way to orient my prototype along with the router position. These two variables are some of the most important factors in my project, and I need to calculate the best position for the prototype to output the desired signal coverage.
|