Jump to content

User:Pcoxx/Cyberspace/Bibliography

From Wikipedia, the free encyclopedia

This is the current revision of this page, as edited by E102Group7 (talk | contribs) at 03:42, 30 September 2024 (changes to Outline of proposed changes). The present address (URL) is a permanent link to this version.

(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

You will be compiling your bibliography and creating an outline of the changes you will make in this sandbox.


Bibliography

[edit]
  • "The National Strategy to Secure Cyberspace" (PDF). Department of Homeland Security. February 2003. Archived from the original on 30 August 2017. Retrieved 19 January 2024.
    • This is a PDF that outlines cyberspace threats and vulnerabilities, national policies and guiding principles, as well as a list of national cyberspace security priorities. This covers the topic in some depth which establishes notability.
  • House, The White (2024-04-30). "National Security Memorandum on Critical Infrastructure Security and Resilience". The White House. Retrieved 2024-09-30.
    • This article published by the official White House webpage discusses national security, operating models, and interdependent systems that can be attacked due to weak infrastructure. It goes into depth on various principles and objectives which can help establish notability.
  • Salem, Aya H.; Azzam, Safaa M.; Emam, O. E.; Abohany, Amr A. (2024-08-04). "Advancing cybersecurity: a comprehensive review of AI-driven detection techniques". Journal of Big Data. 11 (1): 105. doi:10.1186/s40537-024-00957-y. ISSN 2196-1115.
    • This journal discusses possible ways cybersecurity can be advanced by using artificial intelligence in the detection of cyber-attacks. It goes into depth on machine learning and deep learning, along with algorithms examined over sixty studies, which can help establish notability.

References

[edit]

Outline of proposed changes

[edit]
  • The articles included in the bibliography would help contribute to more relevant information because it discusses how national security and cyber security work hand in hand.
  • The third article also highlights how newer developments in artificial intelligence can contribute to advancements in cybersecurity.
  • Other changes I would make to the article would be deleting references of old URLs and webpages that no longer exist.
    • Multiple links that I clicked on have 404 errors or the html is broken.
    • This will improve the page by only including sources that are up to date and that exist for current users to look at and read for better understanding.