Sign In
Not register? Register Now!
You are here: HomeEssayTechnology
Pages:
4 pages/≈1100 words
Sources:
Level:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 21.6
Topic:

Computer Security Article (Essay Sample)

Instructions:

rhetorical analysis of a research report on computer security.

source..
Content:

Rhetorical Analysis: Computer Security Article
Student’s Name
Institutional Affiliation
Rhetorical Analysis: Computer Security Article
Cyber security has been the main concern in the field of information technology which is the discourse sector in this rhetorical analysis. They seek to answer several questions such as have research institutions taken serious steps to curb the situation? Despite the fact that IT security is never absolute secure, is there a need for high level security? Rowe, B. R., Pokryshevskiy, I. D., Link, A. N., and Reeves, D. S. address these concerns in their article Economic Analysis of an Inadequate Cyber Security Technical Infrastructure: National Institute of Standards and Technology. The authors express their dissatisfaction in the way the technical infrastructures are lightly implanted yet disastrous to the economy. They put the audience back to the time of DARPA when security was essential and brings live comparison of the trivialized current situation. The authors made it clear that the cyber security has in one way or another affected their economy hence it should not be trivialized. Cyber security threats and attacks cost U.S. companies tens of billions of dollars a year in direct costs (Rowe, Pokryshevskiy, Link, & Reeves, 2013). This has enabled the authors to create concern to the concerned audience with much help of rhetorical tools and logical formatting of their article that has a self-contained summary comprising the whole issue of computer security.
The literature review is well-developed and organized into a logical format in order to enhance effective understanding by the audience. The authors have supplied a plethora of records of the losses due to cyber security. They impose a recommendation to the government on coming up with a proactive mechanism to prevent future deteriorations. The authors rebuke the audience (companies) for their unethical business management. He talks of “free ride” that has led to poor implementation of technical infrastructure. He argues that cause of downfall of the economy as a result of insecurity highly relies on the companies themselves. It is by giving out several cases of irresponsible and careless mistakes in handling the IT gadgets that the authors have well made their ethos.
Moreover, the authors use different records from different companies to win the vote from audience. The author is addressing the issue to the companies so as to ensure that they are aware of existing danger and maybe impart proper counter measures. The article may be a good blueprint of what the IT gurus ought to deliver to the community. They should give the audience the solution. The author is “awakening” the computer experts from their slumber. He has well addressed the issues that require solution. It might be worthy to criticize the professionals by not putting enough to the same issue as expected of them. The article has a major role of advising the companies on laying down mechanism to reduce the number of attacks.
The sole issue addressed by the article is the IT security and the possible mechanism to mitigate the adversity of its occurrences. The authors involve people’s involvement in the same issue by showing them how the whole issue affects them by using quotations such as “viruses and worm affects your computers (Rowe, Pokryshevskiy, Link & Reeves, 2013).” In a logical way, the authors have outlined the various tactics deployed by attackers. This communicates the prudent way of deciding on the topic of research; it should be the major problem in society. As a result, they insist on personal methods of protecting oneself against the attacks as well as the global counter mechanism towards the attack. It is for this reason that they address the normal day to day issues with interference with technological devices; especially the mobile devices. This is a good illustration of effective use of examples and evidences by the authors.
Most importantly, they use symbolism to claim that less infrastructure has been used in cyber security. Security is a core pillar of business success. They talk of organization “free ride” on the cyber security investments of others (Rowe, Pokryshevskiy, Link, & Reeves, 2013). This shows the need to blame ourselves for the incurrence of losses. The other blame falls in the cyber security technical infrastructure (CSTI). They raise the concern that many organizations are not willing to spend resources on IT security. The authors advocate for the “infratechnologies”. This forms the part of anticipated solution. The authors convince the audience by providing substantial facts. The facts have been outlined on the various companies that have experience attacks and their respective losses (table 2-1). This is a vivid style of presenting arguments. It is for the efforts of convincing the organization to put adequate strategies to counter the situation.
Apart from analyzing the various attacks mechanisms, the author have provided enough solutions to possibly help in depletion of the study problem. This has been an appropriate way of presenting the solution to the arguments addressed in introduction. The method used for data collection was the most appropriate; interviews are better where enough information is required from the interviewers. Data, possibly firsthand, must accompany the report to validate the claims. The indexing of the article has greatly helped the author address his topics categorically. The chronological flow of ideas from the identification of problem to the conclusions is exemplary. The methodologies used in his studies are well stated, each subheading carries full information.
The authors have combined both statutes and records to serve as the oracle of governance. The few mentioned companies are enough to tell the audience of the awareness of threat existence. In his article the author explains the various technical terms as a method of improvisation. The chronological categorizing of title, headlines and subheadi...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Network Security Policy
    Description: The formal network security policy spells out the appropriate expectations of the network use, administration and security in an organization...
    3 pages/≈825 words| APA | Technology | Essay |
  • The Selection of a Database Management System and Database Design
    Description: The Extent to which End-user Should Participate in Database Management System and Database Design Selection...
    1 page/≈275 words| APA | Technology | Essay |
  • Growth Trends
    Description: The essay talk about the various strategies that old ports use to ensure that they remain in business...
    2 pages/≈550 words| APA | Technology | Essay |
Need a Custom Essay Written?
First time 15% Discount!