Wednesday, November 21, 2012

Source Comparison #4

Article 1
"Scientist Find cheaper way to ensure internet security"
November, 20
"http://www.nytimes.com/2012/11/20/technology/fiber-optic-breakthrough-to-improve-internet-security-cheaply.html?ref=technology&_r=0"

Article 2
"Scientist at Toshiba, Cambridge University finds cheaper way to ensure internet security"
November, 20
"http://economictimes.indiatimes.com/tech/internet/scientists-at-toshiba-cambridge-university-find-cheaper-way-to-ensure-internet-security/articleshow/17291905.cms"

Article 3
"Scientist discover cheaper way to enure internet security"
November, 20
"http://www.todayonline.com/Technology/EDC121120-0000093/Scientists-discover-cheaper-way-to-ensure-internet-security"



  • Article 2 copies it's article from the New York Times website; however, article 3 is similar but not bordering on plagiarism.
  • All the articles are were written on the same day.
  • Article 3 almost copies for the first article's title except for the word "find" is now "discover."
  • All articles state that there is an encryption key called "one-time pad" where it's used only once but with the method half of the data are used in different lines.
  • Article 1 and 2 explains how the scientist came up with this discovery. While article #3 leaves that information is out.
  • Articles 1 and 2 delves into the technique of using quantum cryptography is while both article 3 only gleam that information.
  • Where as, articles 1 and 2 both state that governments will be the first to use the new technology, on the other hand article 3 explains how the Swedish government is already implementing such a security measure.
  • Article 3 does not mention what the old method for keeping private files on the internet safe are; where as articles 1 and 2 do.
  • What article 3 also does is explain how with the current system there could be fibres available to use but they are not always easily accessed.
  • All articles states how quantum cryptography will make it easier to show if data was tampered or eavesdropped on. 

No comments:

Post a Comment