Bibliography


Graphics


Cybersecurity in Elections.(2022, February 14) Retrieved November 14, 2023 from https://www.idea.int/news/cybersecurity-elections-recent-developments-europe-online-discussion


Don's Snoweden's Cartoon for Sept 10th. (2023, November 14) Retrieved November 14, 2023 from https://jimshoreandmore.com/products/never-forget-9-11-finished-art-print


Information Technology Vectors & Illustrations. (2023, November 14) Retrieved November 14, 2023 from https://www.freepik.com/vectors/information-technology


Never Forget 9-11. (2023, November 14) Retrieved November 14, 2023 from https://www.thenewstribune.com/news/local/community/gateway/g-opinion/article245536080.html


Source Information Technology Documents Vector Image. (2023, November 14) Retrieved November 14, 2023 from https://www.vectorstock.com/royalty-free-vector/source-information-technology-documents-vector-43032066


Vector Laptop Computer With Academic Icon On White Background. (2021, September 29) Retrieved November 14, 2023 from https://www.freepik.com/premium-vector/laptop-computer-with-academic-icon-white-background_18931133.htm#query=information%20technology%20cartoon&position=16&from_view=keyword&track=ais&uuid=b00c57eb-7589-48fe-aa5f-6488edb44427


References


Enhancing surface cyber risk management. Department of Homeland Security Documents / FIND. 2022. http://mutex.gmu.edu/login?url=https://www.proquest.com/reports/enhancing-surface-cyber-risk-management/docview/2742646766/se-2.

This article provides helpful insights on enhancing cybersecurity measures, which has been instrumental in identifying potential solutions for the issues addressed in my research. The report highlights cybersecurity measures' continuous evolution and growing significance in critical infrastructure sectors like pipelines and rail transportation. It demonstrates the increased focus on security vulnerabilities and the imperative to safeguard essential transportation networks from cyber threats in the post-9/11 period.


Greiman VA. Nuclear cyber attacks: A study of sabotage and regulation of critical infrastructure. International Conference on Cyber Warfare and Security. 2023:103-110. http://mutex.gmu.edu/login?url=https://www.proquest.com/conference-papers-proceedings/nuclear-cyber-attacks-study-sabotage-regulation/docview/2790104801/se-2.

This article is relevant because it examines the connections between cyber threats and critical infrastructure. This topic is essential for my research as it provides valuable insights into potential risks and regulatory considerations. Additionally, it sheds light on the dynamic nature of cybersecurity within the nuclear industry.


Olenick, D., & Ross, R. (n.d.). 20 years after 9/11: How us cybersecurity landscape evolved. Government Information Security. https://www.govinfosecurity.com/20-years-after-911-how-us-cybersecurity-landscape-evolved-a-17497

This article offers valuable insights into the changes that have occurred in the cybersecurity landscape over the last twenty years. It emphasizes the transition from a focus on physical security to the increasing importance of cyber threats in today's world. The article also covers the terminology used in the field, the enduring nature of certain threats, and the significance of access control. These aspects are all crucial in the evolution of cybersecurity. In addition, it discusses the impact of 9/11 on critical infrastructure security and financial regulations, highlighting the necessary adjustments made in response to emerging cyber challenges.


Privacy & Technology. American Civil Liberties Union. (2022, February 16). https://www.aclu.org/issues/privacy-technology#:~:text=Technological%20 innovation%20has%20 outpaced%20our,intimate%20 aspects%20of%20our%20 lives.

This article is highly relevant to the topic of the evolution of cybersecurity since 9/11 because it emphasizes the crucial issue of privacy in the digital age. The statement emphasizes the rapid advancement of technological innovation, which has outpaced the existing safeguards for protecting individuals' digital privacy. The topic of government and corporate tracking of digital footprints and collection of personal data is closely tied to the changing field of cybersecurity. In this landscape, there is a growing demand for strong protection against cyber threats, while also raising concerns about preserving individual privacy. The ACLU's efforts to safeguard civil liberties in light of advancing technology highlight the enduring ethical and social consequences associated with cybersecurity in the post-9/11 era.


Shenouda, J. (2023, March 18). Cybersecurity in 2030: 7 Trends Shaping the Future of Digital Security. LinkedIn. https://www.linkedin.com/pulse/cybersecurity-2030-7-trends-shaping-future-digital-joe#:~:text=Cybersecurity%20Progress%20and%20Accessibility%3A%20Public,resilience%20and%20capacity%20for%20recovery.

As it offers perspectives on the forthcoming issues and trends that will define the cybersecurity environment, this article is very significant to the discussion of how cybersecurity has changed after 9/11. The article recognizes the swift transformations occurring in the digital landscape and their implications for cybersecurity. Furthermore, the article emphasizes the importance of taking proactive measures and implementing anticipatory strategies to effectively tackle emerging cybersecurity threats and trends. This is crucial as cybersecurity practices continue to evolve in the aftermath of the post-9/11 era. The trends mentioned, including the role of AI, internet fragmentation, and privacy concerns, are closely connected to the ethical and social implications of cybersecurity. These implications have undergone significant changes since the events of 9/11. This article highlights the continuous need for evolution and adaptation in the field of cybersecurity.


U.S intelligence chief outlines improvements since 9/11 attacks: Washington post op-ed by U.S. national intelligence director john negroponte. State Department Documents / FIND. 2006. http://mutex.gmu.edu/login?url=https://www.proquest.com/reports/u-s-intelligence-chief-outlines-improvements/docview/189994487/se-2.

This article is highly relevant to my research because it has useful information regarding the evolution of US Intelligence endeavors since 9/11. To comprehend cybersecurity approaches, understanding the changes in these efforts is beneficial. The paper also emphasizes the bigger picture of improving national security during the post-9/11 era.



Blog

https://piccolo-dachshund-58ra.squarespace.com/

Mobile App

https://studio.code.org/projects/applab/IBIfXZi9dvns957CqC-_G86uXBI5XRGqj26UBHqJl2o?sms=true