You are on page 1of 5

Memorandum

Design4Practice (D4P) Program


To:

EGR 186 Students

From:
Re:

Preparing for the Library Session

This assignment is due Monday 9/12.


Bring a laptop for this class session. If you have your own laptop, please bring it. A limited
number of laptops will be available in the classroom.
To receive credit for this assignment:
On BbLearn, upload a PDF of this completed assignment.
During class, you MUST have access to a printed or electronic version of this completed
assignment to join in the discussion. Participation is expected.
For this assignment, you will need to answer the questions below. Type your responses where
indicated. In order to successfully answer these questions, you'll need to:

Start by navigating to http://libraryguides.nau.edu/c.php?g=535307&p=3671312. You'll need


to read everything on that page, and then follow the rest of this worksheet.

Name:

EGR 186-

1) List your Grand Challenge and your reasons why the need for research on this topic is needed:

Grand Challenge Secure cyber space


Reasons

personal data
secure communication

2) Create search terms for your topic and list four search strategies as well as the database that you
searched and the first two results

Page 1

Strategy #1

Secure data flow

Databases

SYSTEM

Number of Results

Title of Result #1

Securing communication

Title of Result #2

Data flow recognition

Strategy #2

Safety of whole system

Databases

HARDWARE

Number of Results 3
Title of Result #1

Individual system security

Title of Result #2

Electronic front

Strategy #3

Secure software

Databases

INTERNATIONAL CLEARING HOUSE

Number of Results 5
Title of Result #1

Biometric technologies

Title of Result #2

Hardware and software security

Strategy #4

Perimeter defense

Databases

GSM

Number of Results 2
Title of Result #1

Firewalls

Title of Result #2

Encryption techniques

3) Choose your optimum Search Strategy # 4


Title of first five results (label one as most helpful and one as least helpful)
Title of Result

Most/Least Helpful

#1

Securing communication

#2

Biometric techniques

#3

Encryption techniques

#4

Firewalls

#5

passwords

4) Using the search terms you created search the library catalog, a subject database (IEEE,
Compendex, ACM, ASCE), Google Scholar, and the web (Google) and write a citation for
each source found.
Library Catalog

IEEE

Subject Databases

ASCE

Google Scholar

GOOGLE

Web/Google

ACM

5) List the 5 references you will use for your research using IEEE citation style and answer the
questions below for each source selected.

a. Who are the authors of the peer-reviewed article?


b. What journal was the peer-reviewed article published in and what date was it published?
c. What are the author's credentials or organizational affiliations given?
d. What is the purpose of the information?
e. Is the information supported by evidence or references?
Reference

Harrison, K. et al., Security Through Uncertainty, Network Security (February 2007), pp. 4-7.

HARRISON

DATA

HARRISON

SECURING DATA

yes

Reference Wulf, W.A. and Anita K. Jones, Cybersecurity, The Bridge 32 (Spring 2002), pp. 41-45.
A

WULF

AMERICAN JOURNAL

ANITA

ENCRYPTON

YES

Information Technology Advisory Committee, Cyber Security: A Crisis of Prioritization


Reference Presidents
(February 2005).

ARTICLE

PRESIDENT INFORMATION

RESEARCH

IT

No

Research Council, Cybersecurity Today and Tomorrow: Pay Now or Pay Later (Washington,
Reference National
D.C.: National Academies Press, 2002).

RESEARCH COUNCIL

CYBER SECURITY

PAYMENT

CYBER CRIME

YES

Reference
A

National Research Council, Toward a Safer and More Secure Cyberspace, eds. Seymour E. Goodman and Herbert
S. Lin (Washington, D.C.: National Academies Press, 2007).

Memorandum

Page 5

You might also like