Preview

Your Mother's Maiden Name Is Not A Secret Anne Diebel Analysis

Good Essays
Open Document
Open Document
1141 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Your Mother's Maiden Name Is Not A Secret Anne Diebel Analysis
In Anne Diebel's article "Your Mother's Maiden Name Is Not a Secret" from The New York Times, she argues that websites that contain important or personal information "protected" by security questions are not secure and need to be replaced. This article was written just after several cyber attacks that happened the previous year. Although Diebel uses many logical arguments, including statistics and examples, her argument is not effective as a whole because of weak facts, unclear paragraphs, and older information. Deibel begins her article by pointing out that basic security questions have been overlooked and accepted for too long. Diebel blames attributes the blame to banks when they chose security questions to "improve their security measures …show more content…
She does not just say something and then leave it undefended. For example, when she was discussing the incidents that have happened as a result of security questions, she does a good job of giving examples of both famous people and celebrities that have been targeted and normal, average people's accounts. This helps the reader realize that security questions are an issue, and they should be fixed. Having facts and examples to back her arguments helped get her point across. This argument could also be seen as effective because of the author's credibility. Anne Diebel is a senior investigator a private investigations firm. This lets the reader know that she has the authority, credibility, and knowledge to write about the subject. While this argument is ineffective, Diebel does a fairly good job of getting her point across because it is not an issue that is typically thought about. She makes the reader realize that weak security questions are an issue and that they should be fixed or removed from websites …show more content…
Some things she could have explained, like what the Equifax breach was and how many people it affected (7). Others needed explained better, such as in the paragraph where she presents some questions that she says assume things and are hard to answer (14), but they seem like they should be useable as security questions to the average reader. Either explaining or giving a quick summary of what happened and what the situation was would have been helpful. Providing some background information or context about the situation so the reader could better understand the seriousness of the event would strengthen her points. Background information would also help the reader understand exactly what happened, why it is a problem, and why it is relevant to the argument Diebel is

You May Also Find These Documents Helpful

  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303–314, Oct. 1998.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    In this article, Eric Bartels does a poor job at showing her side of the story and admitting to lashing out on her every now and then. He only provides the reader…

    • 914 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    Payton, A. M. (2006). Data security breach: seeking a prescription for adequate remedy. Proceedings of the 3rd annual conference on Information security curriculum development (pp. 162-167). New York: ACM.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    She wrote the book Reading the Holocaust book that had a lot of gore information. That includes jews working to kill other jew but in the end still being killed. And jews being boiled. Yet it still intrigued me to read it. Because it gave everything in detail and didn't just skip over the gore facts. Thats why in this paper i will be talking about what happened during the holocaust and why it wont happen in the U.S.A.…

    • 96 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    She provided various opinions of an author, the local community, government officials, parents, and a universal law professor. Incorporating multiple sources allowed for a stronger writing. The strength of her writing comes from just that, the many sources. Another part of her article which strengthens her writing is that her gathered evidence include both sides of the case. For example, pro-Boomer, a UCLA law professor shares their opinion, while against Boomer, the local community’s opinions were also shared going against Boomer. Simon’s writing has included sources for both sides. The problem with a weak explanation is not present in her article because both sides are presented.…

    • 542 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Her argument that our country needs to work on creating opportunities for children and fairness…

    • 218 Words
    • 1 Page
    Good Essays
  • Good Essays

    Finance Questions

    • 600 Words
    • 2 Pages

    3. How does GLBA impact information systems security and the need for information systems security practitioners and professionals?…

    • 600 Words
    • 2 Pages
    Good Essays
  • Good Essays

    I agree with you on the first paragraph. She's intelligent and informed but not necessarily a good person.…

    • 333 Words
    • 2 Pages
    Good Essays
  • Good Essays

    [Us as] security professional need to be aware of common attack methods so that they can take proactive steps to prevent attacks [by recognizing] them when they occur and respond [to them] appropriately (James M. Stewart, p. 48).…

    • 1033 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Therefore, although mass surveillance improves security after the attacks of 9/11, government overreach and intrusions on privacy deprive individuals of their right to be free to live their lives and make their private information be vulnerable to abuse…

    • 501 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Never allow any type of attack, successful or otherwise to go undocumented or wasted. “If you experience an attack, learn from it,” For example, let us analyze an information security breach case of a financial corporation that caught an employee trying to steal very private company trading algorithms. Accountability and authenticity must immediately be exercised to ensure…

    • 639 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    I believe that overall her purpose for writing this essay was revealed in a very successful manner and that when she closes the essay she sums up everything that she wanted to be understood up. I especially liked how she mentions the fact of how if there was a cure she would take it making her feel even more relatable and human to the…

    • 253 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data breaches and cyber-attack frequency has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and a company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of a Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident.” (Ponemon Institute, 2013)…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    When an organization uses and relies on computer systems and information technology to assist in running their company(s) and also uses these resources to store important, personal information about clients, customers, employees, and the organization itself, it is important to have the adequate security protection in place to prevent this information from being compromised. The following summary will discuss how IBM prevents security breaches by using technology to reduce the rampant crime committed against them.…

    • 555 Words
    • 3 Pages
    Good Essays

Related Topics