These are the sources and citations used to research Cyber Security. This bibliography was generated on Cite This For Me on

  • Website

    Massive cyber-attack hits 99 countries

    2018

    In-text: (Massive cyber-attack hits 99 countries, 2018)

    Your Bibliography: BBC News. 2018. Massive cyber-attack hits 99 countries. [online] Available at: <http://www.bbc.co.uk/news/technology-39901382> [Accessed 22 May 2018].

  • Website

    Bordessa, E.

    The real costs of a data breach

    2018

    In-text: (Bordessa, 2018)

    Your Bibliography: Bordessa, E., 2018. The real costs of a data breach. [online] IT Governance Blog. Available at: <https://www.itgovernance.co.uk/blog/the-real-costs-of-a-data-breach/> [Accessed 22 May 2018].

  • Book

    Burnett, M.

    Perfect Password

    2006 - William Andrew

    In-text: (Burnett, 2006)

    Your Bibliography: Burnett, M., 2006. Perfect Password. 1st ed. William Andrew.

  • Book

    Colarik, A. M.

    Cyber terrorism

    2006 - Idea Group Pub - Hershey, PA

    In-text: (Colarik, 2006)

    Your Bibliography: Colarik, A., 2006. Cyber terrorism. 1st ed. Hershey, PA: Idea Group Pub.

  • Book

    Holt, T. J., Bossler, A. M. and Seigfried-Spellar, K. C.

    Cybercrime and digital forensics

    2017 - Routledge

    In-text: (Holt, Bossler and Seigfried-Spellar, 2017)

    Your Bibliography: Holt, T., Bossler, A. and Seigfried-Spellar, K., 2017. Cybercrime and digital forensics. 1st ed. Routledge.

  • Website

    Anon

    2018

    In-text: (2018)

    Your Bibliography: Ics-cert.us-cert.gov. 2018. [online] Available at: <https://ics-cert.us-cert.gov/sites/default/files/documents/10_Basic_Cybersecurity_Measures-WaterISAC_June2015_S508C.pdf> [Accessed 22 May 2018].

  • Website

    Keyworth, M. and Wall, M.

    The 'bogus boss' email scam costing firms millions

    2016 - BBC

    In-text: (Keyworth and Wall, 2016)

    Your Bibliography: Keyworth, M. and Wall, M., 2016. The 'bogus boss' email scam costing firms millions. [online] BBC News. Available at: <http://www.bbc.com/news/business-35250678> [Accessed 23 May 2018].

  • Journal

    Mansfield-Devine, S.

    The Ashley Madison affair

    2015 - Network Security

    In-text: (Mansfield-Devine, 2015)

    Your Bibliography: Mansfield-Devine, S., 2015. The Ashley Madison affair. Network Security, [online] 2015(9), pp.8-16. Available at: <https://www-sciencedirect-com.ezproxy.sunderland.ac.uk/science/article/pii/S1353485815300805> [Accessed 21 May 2018].

  • Book

    Qian, Y., Tipper, D., Krishnamurthy, P. and Joshi, J.

    Information Assurance

    2010 - Elsevier Science & Technology

    In-text: (Qian, Tipper, Krishnamurthy and Joshi, 2010)

    Your Bibliography: Qian, Y., Tipper, D., Krishnamurthy, P. and Joshi, J., 2010. Information Assurance. 1st ed. Elsevier Science & Technology.

  • Website

    What is advanced persistent threat (APT)? - Definition from WhatIs.com

    2018

    In-text: (What is advanced persistent threat (APT)? - Definition from WhatIs.com, 2018)

    Your Bibliography: SearchSecurity. 2018. What is advanced persistent threat (APT)? - Definition from WhatIs.com. [online] Available at: <https://searchsecurity.techtarget.com/definition/advanced-persistent-threat-APT> [Accessed 23 May 2018].

  • Website

    The average cost of a Data Breach in 2017 is $3.62 million | Sfax

    2018

    In-text: (The average cost of a Data Breach in 2017 is $3.62 million | Sfax, 2018)

    Your Bibliography: Sfax. 2018. The average cost of a Data Breach in 2017 is $3.62 million | Sfax. [online] Available at: <https://www.scrypt.com/blog/average-cost-data-breach-2017-3-62-million/> [Accessed 22 May 2018].

  • Website

    Solutions, G.

    Why Malware is Still the Biggest Threat to Your Business

    2018

    In-text: (Solutions, 2018)

    Your Bibliography: Solutions, G., 2018. Why Malware is Still the Biggest Threat to Your Business. [online] Gulfsouthtech.com. Available at: <http://www.gulfsouthtech.com/blog/why-malware-is-still-the-biggest-threat-to-your-business> [Accessed 23 May 2018].

  • Website

    Hacktivism 101: A Brief History and Timeline of Notable Incidents - Security News - Trend Micro USA

    2018

    In-text: (Hacktivism 101: A Brief History and Timeline of Notable Incidents - Security News - Trend Micro USA, 2018)

    Your Bibliography: Trendmicro.com. 2018. Hacktivism 101: A Brief History and Timeline of Notable Incidents - Security News - Trend Micro USA. [online] Available at: <https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/hacktivism-101-a-brief-history-of-notable-incidents> [Accessed 23 May 2018].

  • Book

    Ulsch, N. M.

    Cyber threat!

    2014 - Wiley

    In-text: (Ulsch, 2014)

    Your Bibliography: Ulsch, N., 2014. Cyber threat!. 1st ed. Wiley.

  • Website

    What is confidentiality, integrity, and availability (CIA triad)? - Definition from WhatIs.com

    2018

    In-text: (What is confidentiality, integrity, and availability (CIA triad)? - Definition from WhatIs.com, 2018)

    Your Bibliography: WhatIs.com. 2018. What is confidentiality, integrity, and availability (CIA triad)? - Definition from WhatIs.com. [online] Available at: <https://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA> [Accessed 23 May 2018].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join