These are the sources and citations used to research Attacker. This bibliography was generated on Cite This For Me on
In-text: (Nessus Professional Datasheet, 2018)
Your Bibliography: 2018. Nessus Professional Datasheet. [ebook] Tenable. Available at: <http://info.tenable.com/rs/934-XQB-568/images/NessusPro__DS__EN_v8.pdf> [Accessed 13 June 2018].
In-text: (Summarizing The Five Phases of Penetration Testing - Cybrary, 2018)
Your Bibliography: Cybrary. 2018. Summarizing The Five Phases of Penetration Testing - Cybrary. [online] Available at: <https://www.cybrary.it/2015/05/summarizing-the-five-phases-of-penetration-testing/> [Accessed 6 May 2015].
In-text: (Dutton, 2018)
Your Bibliography: Dutton, J., 2018. 4 of the 5 top causes of data breaches are because of human or process error. [online] IT Governance Blog. Available at: <https://www.itgovernance.co.uk/blog/4-of-the-5-top-causes-of-data-breaches-are-because-of-human-or-process-error/> [Accessed 13 May 2018].
In-text: (Rootkit, 2018)
Your Bibliography: En.wikipedia.org. 2018. Rootkit. [online] Available at: <https://en.wikipedia.org/wiki/Rootkit> [Accessed 13 June 2018].
In-text: (Feldman, 2016)
Your Bibliography: Feldman, G., 2016. Top Five Cyber-Attack Vectors | US Computer Connection. [online] US Computer Connection. Available at: <https://www.uscomputer.com/2016/11/23/top-five-cyber-attack-vectors/> [Accessed 13 May 2018].
A security researcher says there is a 100-percent success rate any time pen-testing uses social engineering to target victims.
In-text: (Lambert, 2013)
Your Bibliography: Lambert, P., 2013. Security's weakest link: Technology no match for social engineering. [online] TechRepublic. Available at: <https://www.techrepublic.com/blog/it-security/securitys-weakest-link-technology-no-match-for-social-engineering/> [Accessed 13 June 2018].
In-text: (Lyon, 2010)
Your Bibliography: Lyon, G., 2010. nmap network scanning. Sunnyvale, CA: Insecure.Com LLC.
In-text: (Nmap: the Network Mapper - Free Security Scanner, 2018)
Your Bibliography: Nmap.org. 2018. Nmap: the Network Mapper - Free Security Scanner. [online] Available at: <https://nmap.org/> [Accessed 13 June 2018].
In-text: (IT Management Software & Monitoring Tools | SolarWinds, 2018)
Your Bibliography: Solarwinds.com. 2018. IT Management Software & Monitoring Tools | SolarWinds. [online] Available at: <https://www.solarwinds.com> [Accessed 13 June 2018].
10,587 students joined last month!