User:NicoKokolis/sandbox

Article Evaluation
The article I will be evaluating for this week's assignment is the WIkipedia page for the Red Hot Chili Pepper's song, By The Way.

Everything mentioned in the article doesn't deviate from the topic it had created itself upon. All information is up to date given how information about the song hadn't been updated since it's release back in 2002.

The article remains neutral as it displays the facts and the facts only concerning the history of the song with no bias against or with the song in the presence of this article.

All the links in this article lead to the sources they present themselves with properly without any misinformation nor bias.

The talk page has found things that have needed to be tweaked about this article page such as the missing link for the remix of the song by Rene Amesz. The talk page has found itself under three WikiProjects being, WikiProject Alternative Music, WikiProject Red Hot Chili Peppers, and WikiProject Songs. It appears that the talk page talks about the article the same way we have been talking about articles in class.

Assignment 6
1) Cyber Risk In A New Era: Remedy First, Prevent Second

2) Cybersecurity will become a more prevalent topic, and corporations who handle cyber risk in a serious fashion will have a safer future.

3) One of the larger points in the article is that cyber risk is becoming a more serious topic that companies should take notice of.

4) This topic is worth undertaking due to how relevant it has become. More and more companies are looking for ways to implement cybersecurity into their business strategies.

5) The technological standpoints of the topic is to ensure the safety of all databases.

6) The ethical standpoints are mostly positive of its implications.

7) The societal standpoints are positive in the implications of cybersecurity.

8) The audience for this article is corporations who are trying to ensure their stability in the future.

Assignment 7
A company’s internal risk management practices may be strong; however, the oversight a company has over its third party vendors may be the biggest failure point. It is important for a company to ensure the efficiency of their third-party vendors when hoping to achieve success. According to a white paper published by Bitsight, a cybersecurity rating system, “59% of organizations have experienced a data breach caused by one of their vendors or third parties”. In other words, when a company chooses to share their confidential information with a third party vendor, they need to ensure that their information is transferred, stored, handled and managed in a secure manner. If the third party vendor does not have good cybersecurity controls, then the company’s information can be leaked or breached. “It is difficult enough for organizations to have their own internal vulnerabilities in check, but even more challenging to ensure that every vendor across their supply chain has strong security practices in place. Eighty percent of business leaders say that protecting their companies from “weaknesses in third parties is increasingly difficult given the complexity of today’s sprawling Internet ecosystems.”  The company is accountable for ensuring that they protect the confidential information of their customers, clients and employees. It does not matter that the third party vendor is the failure point for the breach; the company will sustain the long-term reputational damage and potential fines, enforcement actions and penalties associated with the breach. “Internally, an organization has the tools and data access it needs in order to diagnose, respond to, and remediate a vulnerability or infection in its systems. But when it comes to another organization’s environment, it becomes more challenging. The organization’s visibility into its third-parties’ security policies, vulnerabilities, and threats is limited: 64 percent of large organizations and 67 percent of smaller organizations have no visibility into the risks in their third-parties’ environments. Unless a vendor allows an organization to do an onsite assessment or install vulnerability management solutions within their environment, the critical security information resides behind closed doors. Thirty-six percent of organizations rely on externally observable data sources to determine the risks of their third parties. These may include security ratings, external network scans, threat intelligence feeds, and independent assessments such as SOC 2 attestations and ISO 27001/ISO 27018 compliance that define point-in-time internal security controls and processes. Providers who examine this data, such as BitSight, are able to inform an organization of the vulnerabilities and infections across their supply chain. According to BitSight data, all of which is externally observable, of the organizations continuously monitored by BitSight: • 52.15 percent have at least one vulnerability with a CVSS rating of 4+ • 3.25 percent have at least one vulnerability with a CVSS rating of 7+ • 3.03 percent have at least one vulnerability with a CVSS rating of 9+ Although these statistics are not confirmation that a vulnerability actually exists, they provide enough data to require further vendor assessment and monitoring. Having this perspective across all third-party organizations enables the risks they pose to be monitored on a global scale.”  ]

Assignment 9
The reviews I have received from my classmates have helped me tremendously with improving my article. I added information to explain how security rating services will have an increase in business.