It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Our personal and financial information is stored in numerous places online - shopping websites and merchants, credit card machines and databases, social networking sites, financial institutions, government data banks to name a few - and devices to access these sites are increasingly mobile and wireless. Hackers trying to gain access to personal, government and financial information are constant threats, and cyber security measures that avoid data breaches are increasingly important. Here are some resources to get you started with a general overview; narrower research topics could include data breaches in business and government, identity theft, cyber terrorism, cloud computing security, cryptography, malware, information assurance, hacked government information, cyber espionage, and enterprise risk management.
Prepared by the President’s Council of Advisors on Science and Technology, this report examines current technologies for data security and privacy, explains current capabilities and trends, and makes policy recommendations.
"Columbia International Affairs Online (CIAO) is the world’s largest online resource of documents and articles devoted to research, analysis, and scholarship on international politics and related fields, including security studies, global finance, diplomatic practice, humanitarian law, global governance, development studies, and environmental studies."
"CQ Press Library - the place to search or browse resources on American government, current affairs, history, politics, public policy, and data analysis for the social sciences." Use this resource to search for current and historical information about cyber security, cyber crime, and more.
CQ Researcher provides in-depth reports on a variety of current hot-topics. "Each single-themed, 12,000-word report is researched and written by a seasoned journalist. The consistent, reader-friendly organization provides researchers with an introductory overview, which includes three pro-con debates; a background and chronology on the topic; an assessment of the current situation; tables and maps; a pro/con debate by representatives of opposing positions; and bibliographies of key sources." Search for "cybersecurity" to view reports on this subject.