Bibliography
Graphics
"A red laptop computer" clip art on a syllabus.html page
is obtained from Microsoft Office 2010 clip art collection
(retrieved on 10/25/2014).
- This picture was used as a place holder
for many of the images on my project website.
"Russian teenager" image on a background.html page
is obtained from Google Images (retrieved on 11/06/2014).
- This image depicts the Russian teenager
who is behind the malware known as BlackPOS.
"statistics" image on a background.html page
is obtained from Google Images (retrieved on 11/06/2014).
- This image provides a visual example of
the statistics of the number of people affected by the breaching
of Target and Home Depot.
"Target comic" image on a background.html page
is obtained from Google Images (retrieved on 11/06/2014).
- This image provides a humorous look at how the
Target security breach has affected its customers.
"who's next" image on a legalethical.html page
is obtained from Google Images (retrieved on 11/06/2014).
- This image depicts a mask that is an unnerving symbol
of terrorism, showing that any store could be attacked at any moment.
"kids on computer" image on a legalethical.html page
is obtained from Google Images (retrieved on 11/06/2014).
- This picture was used to show that children
can be taught to use a computer responsibly.
"girl on computer falling code" image on a legalethical.html page
is obtained from Google Images (retrieved on 10/25/2014).
- This computer shows the potential that a child
has at his or her fingertips when he or she has strong coding abilities.
"robber approaches" clip art on a security.html page
is obtained from Microsoft Office 2010 clip art collection
(retrieved on 11/07/2014).
- This clip art shows a robber approaching an unprotected
computer, which symbolizes the ease of access many hackers have with modern computers.
"locked card" clip art on a security.html page
is obtained from Microsoft Office 2010 clip art collection
(retrieved on 11/07/2014).
- This clip art shows a credit card with a lock, which symbolizes the
protection that Abine provides with its Masked Credit Cards.
"robber defeated" clip art on a security.html page
is obtained from Microsoft Office 2010 clip art collection
(retrieved on 11/07/2014).
- This clip art shows the robber from the previous clip art
unable to access the locked computer, which is a metaphor for the positive
outcome of using Masked Credit Cards.
"sale!" clip art on a conclusion.html page
is obtained from Microsoft Office 2010 clip art collection
(retrieved on 11/07/2014).
- This clip art depicts a large sale banner that many stores
use to attract its consumers, especially on holidays like Thanksgiving and Christmas.
"card and dollar sign" clip art on a conclusion.html page
is obtained from Microsoft Office 2010 clip art collection
(retrieved on 11/07/2014).
- This clip art exemplifies the amount of money people have on their
credit cards, which makes them easy targets for hackers who want to steal their money.
"shopping cart" clip art on a conclusion.html page
is obtained from Microsoft Office 2010 clip art collection
(retrieved on 11/07/2014).
- This clip art shows a shopping cart filled with items that people would
normally buy during a large sale, especially around the Christmas season.
"flaming sale banner" clip art on a conclusion.html page
is obtained from Microsoft Office 2010 clip art collection
(retrieved on 11/07/2014).
- This clip art shows another example of how retail stores attract consumers
through eye-catching advertisements.
"credit card with jail cell" clip art on a conclusion.html page
is obtained from Microsoft Office 2010 clip art collection
(retrieved on 11/07/2014).
- This clip art is a forewarning to credit card owners who may be arrested because
their stolen information is being used to buy weaponry or other dangerous items, or to the hackers because
the credit cards they target can land them in jail for gaining illegal access to them.
"terrorist" image on a conclusion.html page
is obtained from Google Images (retrieved on 11/06/2014).
- This picture shows a Youtube video image of a terrorist communicating through video
veiling himself or herself with the same mask that many terrorists identify themselves with.
"child with terrorist mask" image on a conclusion.html page
is obtained from Google Images (retrieved on 11/06/2014).
- This image shows a little boy wearing a terrorist mask, which foreshadows a fearful future that
many societies face if they do not teach their children to use their coding abilities for the good of others.
"IT 103 Project Video: From Raids to Recovery" video (created on 10/24/2014).
- Contains various Youtube clips that were used to portray the
causes and effects of retail store hacking, and coverage of the retail security breaches through various news reports.
This video was created using Windows Movie Maker 10. Permission from the artist/copyright holder(s) to use these video clips.
Youtube Terms of Service and Copyrights pages.
References to Cited Articles
- "56 million payment cards compromised in Home Depot breach." (19 September, 2014).
Progressive Digital Media Technology News. Retrieved from
ProQuest Computer Science Collection
on 01 October, 2014.
- This source provides details about the recent Home Depot security breach, including the number
of people affected by the breach, as well as the time at which the malware used in the breach was present in Home
Depot stores. This feed proves to be reliable because it is published in a medium that specializes in business news
and other economic information. While the author is not listed in the publication information, the article has been published
close to the time when Home Depot's breach occurred.
- "Abine; Abine's Masked Credit Cards Stop Data Breaches Like Home Depot's - Unlike Apple Pay, They Work Everywhere Today."
(30 September, 2014). Information Technology Business. p. 65. Retrieved from
ProQuest Computer Science Collection
on 01 October, 2014.
- This source discusses a new development in credit-debit card information with the implementation
of Masked Credit Cards, temporary credit cards that provide users and merchants with unique information that does not expose
real private information of credit-debit card holders. This source is reliable because it provides links to Abine's website
containing more information about the product. There is also a link in the article that leads to a page where people specifically
affected by the attack on Home Depot can subscribe to Abine's annual subscription plan.
- "Alleged Home Depot breach may have involved Target malware." (08 September, 2014). Progressive Digital Media Technology News.
Retrieved from ProQuest Computer Science Collection
on 01 October, 2014.
- This wire feed provides details about the origin of the virus BlackPOS that was used to infiltrate
Target retailer stores, linking it back to areas in the Middle East where anti-U.S. influence is present. The article
also discusses the possibility of the Home Depot virus being the same virus that pilfered information from Target's stores.
This cross reference to Target's breach incident strengthens the reliability of the article because it contains knowledge of
other breaches that have recently affected U.S. retailers.
- D'Innocenzio, A. "Home Depot Data Breach Far Exceeds Last Year's Target Hack." (18 September, 2014).
The Associated Press. Retrieved from
AOL Daily Finance on 02 October, 2014.
- This news article contains information about specific locations of Target and Home Depot stores in the U.S., Canada,
and Mexico that have been affected by the breach, stating that Home Depot was affected more than Target. Profit and sales information of
both stores is included. The article is posted on a site that covers specific business information and is supported by AOL.
- Gonsalves, A. "Researcher disputes report BlackPOS used in Home Depot, Target attacks." (15 September, 2014). ITworld.com. Retrieved from
ProQuest Computer Science Collection
on 02 October, 2014.
- While the URL of the website may be professionally misleading, the article itself shares new information about the origin of the virus
BlackPOS. The article disputes previous speculation about BlackPOS affecting both Target and Home Depot, and gives exact details about analyses have linked
BlackPOS' origin to a Russian teenager. This article comes from a blog that seems to specialize in IT security that is related to hacking.
- Sakar, D. "Two Democratic Senators request more info from Apple, Home Depot about data breach incidents." (11 September, 2014). FierceGovernmentIT. Retrieved from
ProQuest Computer Science Collection
on 02 October, 2014.
- This article shares information about the involvement of the U.S. government, specifically Democratic senators Rockefeller and McCaskill,
in investigations concerning the security breach of Home Depot and the leaking of private photographs from iCloud. The article also contains information about
related articles and links to the letters written by the Democratic senators themselves. Therefore, this source is closely connected with the U.S. government
because it provides primary source information.
- "Timeline of Space Exploration." (2009). TheSpaceRace.com. Retrieved from
TheSpaceRace.com on 02 October, 2014.
- This website provides a timeline of the Space Race between the United
States and Russia. According to the copyright information located at the bottom of the page,
the website has not been updated since 2009, which may be crucial since this website is only
eight years old. The copyright information also states that the website has no affiliation with
NASA.
- This article provides reasons for why the U.S. is frequently targeted by hackers, as well as reasons for
why the U.S. continues to be vulnerable to these cyber attacks. The article also discusses other U.S. retailers that have
been affected by security breaches.