Tuesday, November 5, 2024

Evaluating and Controlling Technology keywords

information sources, reliability, authentication, community, digital divide, knowledge sharing, machine learning, control systems, evaluation, automation, feedback, net neutrality, cryptocurrency

Choose ONE (1) KEYWORD from the Keywords list for this module. 
Find two (2) resources that provide information about the word and how it relates to the course. 
These resources can be an article, blog post, diagram, chart, video, podcast, or an info-graphic. Rate each resource on a scale of 1 to 5. To determine the score, identify 5 characteristics of each resource (good and bad). If there are 3 good things and 2 not-so-good things, give it a rating of 3/5. Do this for both resources you select. Post the word, links to your selected resources, the scores and the lists of good and not-so-good characteristics, and a brief description about your selection for each, to the discussion Evaluating and Controlling Technology keywords.


The keyword I chose was authentication

Resources (1)   5 User Authentication Methods that Can Prevent the Next Breach

https://www.idrnd.ai/5-authentication-methods-that-can-prevent-the-next-breach/#:~:text=Authentication%20is%20the%20process%20of,credentials%20like%20username%20and%20password.



 I give rating 3 out of 5. Good characteristic that the post making it easy to understand, it provides real-world examples of how each method helps prevent security breaches and it highlights the need for better authentication due to frequent data breaches. Not so good characteristics the post is lack of detail and does not have infographic


Resources (2): Authentication in Internet Banking: A Lesson in Risk Management

https://www.fdic.gov/bank-examinations/authentication-internet-banking-lesson-risk-management


 I give rating 3 out of 5.

Good characteristics are the blog post gives a simple overview of authentication in digital banking. I chose it because it’s easy to read and has helpful visuals, although it could use more technical detail and official information. 


Nima Yousefi

Nov 8 10:49am


Reply from Nima Yousefi

The digital divide highlights the inequality in internet and technology access that may impact education, job opportunities, and economic growth. Net neutrality ensures an open internet by allowing all users equal access to information and preventing companies from controlling online content and speeds.


This article explores approaches to reduce the digital divide, including technology access, digital literacy, and infrastructure improvements. I would give this article 4.5/5 rating becuase it is very informative and practical.


https://ctu.ieee.org/solutions-to-the-digital-divide-moving-toward-a-more-equitable-future/Links to an external site.


This video examines the digital divide, explaining its causes, such as income disparity, rural-urban divides, and gaps in digital literacy. It also looks at various ways that communities can help bridge this divide.


https://www.youtube.com/watch?v=atg2ufpsst8Links to an external site.


I would rate this video 4/5 because it is ideal for those seeking a visual introduction to the digital divide, explaining its importance and possible solutions in an engaging and accessible format.


Reply to post from Nima YousefiReply

Mark as UnreadMark as Unread

PT

Phyu Phyu Thant

Nov 9 1:42am


Reply from Phyu Phyu Thant

Hi Nima, 


            Thanks for highlighted the important points about the digital divide and net neutrality. The article and video are very informative and easy to understand these issues and exploring practical solutions.  What impact do you think net neutrality has on reducing the digital divide, especially for communities with limited internet access?


Reply to post from Phyu Phyu ThantReply

Mark as UnreadMark as Unread


Not so good - The blog doesn’t cover technical details. It doesn’t provide as much reliable information as an official source.

  1. The article explains different authentication methods in simple language, making it easy to understand.
  2. It provides real-world examples of how each authentication method can help prevent security breaches.
  3. It addresses the rising need for improved authentication due to frequent data breaches, making it highly relevant to today’s security landscape.

Not-so-Good Characteristics:

  1. The explanations are basic and don't go into enough detail, which might be less helpful for readers who want more advanced information.
  2. The article doesn’t include visuals or infographics, which could help readers better understand complex methods.
Resources 2 : Authentication in Internet Banking: A Lesson in Risk Management


Resource 2:
Link: [Authentication in Digital Banking (Example Blog Post)]
Rating: 3/5

Good Characteristics:

Engaging Tone: The blog post is written in a conversational style, making it easy to follow.
Updated Examples: Uses recent examples to show how authentication evolves with new technologies.
Visual Aids: Diagrams are included to help visualize authentication processes.
Not-So-Good Characteristics:

Limited Depth: The blog lacks comprehensive coverage and doesn’t explain more technical details.
Possible Bias: As it’s hosted on a commercial website, it may emphasize certain solutions for promotional purposes.
Description:
This blog post offers a simple introduction to authentication in digital banking, with visuals to aid understanding. I selected it as a complement to the FDIC article for its approachable style and real-world examples, though it lacks the depth of a more official source. This blend of resources provides a well-rounded view of internet banking security.

No comments:

Post a Comment

Groundbreaking Framework for the Safe and Secure Deployment of AI in Critical Infrastructure Unveiled by Department of Homeland Security

  Groundbreaking Framework for the Safe and Secure Deployment of AI in Critical Infrastructure Unveiled by Department of Homeland Security R...