Week 4 – cyber security
400+ Words Keep information technology and Cyber Security Discussion Points: How does data become usable information? How can it be misused? Find articles to support your argument in both situations. Is the article based on quantitative or qualitative research? Explain. What are the differences between primary and secondary sources? Provide examples of primary and/or secondary sources you will use in your paper.