Answered step by step
Verified Expert Solution
Link Copied!
Question
1 Approved Answer

In the article Protecting Yourself from IT Threats: Increasingly, It's Artificial Intelligence vs Cyber-Criminals , the author Charlie Christensen discusses the many ways hackers try

In the article Protecting Yourself from IT Threats: Increasingly, It's Artificial Intelligence vs Cyber-Criminals, the author Charlie Christensen discusses the many ways hackers try to steal information from businesses of varying scales and state the importance of investing in the protection against these hackers. Christensen argued that it is wiser to pay for a working security system that defends against cyber-attacks as "[t]he cost of the systems to protect you is far less [than] the frequently irreparable harm caused by a breach or infection" (Christensen 37). As outlined in the article, often these cyber criminals who compromise data systems obtain personal information of customers and either use the information to siphon money from the customers' bank accounts, use the information as ransom so that the company pays them to not use the information that they have stolen, or in the worst cases both. Though more successful and larger companies might seem to be more appealing as potential targets for these cyber-criminals being that they have more customers and more money to pay out, Christensen mentions in the article that the less established businesses are easier to breach being that they are less likely to have invested capital into adequate protection against cyber attacks and thus making them "more lucrative to hit 50 or 100 small companies for $100,000 than a single large company for, say, $2 million" (Christensen 40). The author then goes on to discuss how a good cyber-security system is comparable to an onion such that they both consist of multiple layers. The layers of a cyber-security system are the different facets of technology being implemented to defend against cyber-attacks, which Christensen discusses a few including Next Generation Antivirus (NGAV) and Enhanced Detection and Response (EDR) or Extended Detection and Response (XDR). NGAV helps discover previously unidentified threats within a system through the process of predictive analysis powered by machine learning, which is based on the normative processes within the system itself. Christensen stated that EDR/XDR all "continue to use traditional signature-based antivirus and NGAV, but they also introduce the use of artificial intelligence (AI)" (Christensen 40). The author expands further into how companies can utilize preventative measures in tandem with cyber-security systems such as ensuring that devices operating on a company's network are updated to the current versions, are running operating systems that are still actively supported by their respective companies, and minimizing the number of users who have administrative capabilities on the network. As Christensen elaborates throughout the article, businesspeople who take these proper steps in protecting their companies from cyber-attacks may not be invulnerable to the seasoned hackers out there in the world, they are at far less risk than those who do not invest the necessary capital into cyber-security.

The article written by Charlie Christensen explained the potential risks companies are exposed to while stressing the importance of having adequate cyber-security systems and measures in place to minimize such risks of cyber-attacks. While the author does a good job of elaborating on the kinds of cyber-attacks companies are at risk of enduring, the elements of technology that exist to help them against such attacks, and generally why companies ought to invest in such technologies to reduce the potentiality of cyber-attacks, the author does not give any real-world examples of companies that have been victims of such cyber-crimes. The points that Christensen brought up in the article about how significant the cost differential of a sufficient cyber-security system and a system breach of thousands of customers' financial information could be were detailed enough to express why companies ought to have proper cyber-security systems on their networks. Christensen avoided interjecting opinions into the article and strictly discussed the risks companies are exposed to with and without cyber-security systems while discussing in detail how cyber-security systems help protect companies against the various types of cyber-attacks. The only notable issue that is present in the article is the lack of real-world examples used within the article to support the statements regarding the potential damages companies face when becoming victims of cyber-security breaches. Without the use of real-world examples, the statements regarding potential damages endured by cyber-threats made throughout the article are general but could be specified with references to businesses who previously had been victims of cyber crimes and endured financial damages. Christensen did not make any contradictions throughout the article, nor did the argument made throughout the article oversimplify the problems in discussion.

Works Cited

Christensen, Charlie. "Protecting Yourself from IT Threats: Increasingly, It's Artificial Intelligence vs Cyber-Criminals."BusinessWest, vol. 39, no. 2, May 2022, pp. 36-40.EBSCOhost, search.ebscohost.com/login.aspx?direct=true&db=edo&AN=157169993&site=eds-live&scope=site. Accessed 18 January 2024.

ORGANIZATION

Does the argument analysis contain a brief introduction that Introduces author's topic?

Does the essay contain a thesis statement?

Does the essay open effectively?

Does the writer introduce his/her topic to the reader? Explain.

If the essay does not contain a thesis statement, propose one.

Does the essay contain clearly stated topic sentences in each body paragraph? If not, propose some in the space provided.

Are paragraphs organized in a way that makes logical sense?

In each paragraph, do sentences contain ideas that follow one another in a logical manner?

Are there places where an idea or topic seems to shift unexpectedly?

Are there places in the text where you are confused as a reader?

Does each paragraph contain a topic sentence?

Does writer use transitional words in order to help clarify connections? (ie. similarly, likewise, however, but, on the contrary)

Does the writer use transitions between sentences/paragraphs to link his/her ideas?

Are there places where the writer could add transitions to make the writing more organized?

Does essay contain a separate concluding paragraph? Explain.

Does the essay close effectively?

Does writer leave the reader with some sense of finality? Explain.

VARIETY/SOPHISTICATION

Do sentences contain a mix of simple and more complex structures?

Are there places where the sentences seem overly simplistic?

Does writer use words that sound sophisticated?

Are there places where the writer might use more sophisticated language to convey his/her message?

Does the tone sound professional?

Are there places where the writer could use more professional words?

SPECIFICITY

Does writer assess the writer's qualifications, personal experience or academic training?

Does writer demonstrate that author has adequate knowledge of the subject?

Does writer question the writer's claim (argument)?

Does the writer question the evidence presented?

Does writer support his/her statements with specific details, opinions, facts, etc.?

Are there places where the writer has not provided sufficient details to support his/her opinions?

Does writer develop each statement/idea with multiple examples?

Is writing extremely detailed?

Are there places where the writing seems a bit vague or general?

Does writing avoid vague words/phrases such as "a lot," "a great deal of time," "big," "small," "most," etc.?

CONCISION Is writing concise and void of excessive wordiness and/or repetition?

Are there places where the writer seems to repeat the same idea?

Does writing only include the words, sentences, or paragraphs needed to convey the message?

Are there sentences that contain more words than are necessary?

ACCURACY/CORRECTNESS Does writer use correct punctuation, grammar, and spelling?

Does writer use accurate words, information, and data?

What types of revision would you recommend in order for the essay to be more successful?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image
Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Principles of Information Systems

Authors: Ralph M. Stair, George W. Reynolds

9th edition

978-1337097536, 1337097535, 978-1337515634, 1337515639, 978-0324665284

More Books

Students explore these related Algorithms questions

Question

List all of the 4-permutations.

Answered: 3 weeks ago

Question

Define the term computer network.

Answered: 3 weeks ago

Question

What is an Internet chat room?

Answered: 3 weeks ago