Week 4 – Cyber Security

400+ Words

Keep information technology and Cyber Security 

Discussion Points:

  • How does data become usable information?
  • How can it be misused?
  • Find articles to support your argument in both situations.
  • Is the article based on quantitative or qualitative research? Explain.
  • What are the differences between primary and secondary sources?
  • Provide examples of primary and/or secondary sources you will use in your paper.