These are the sources and citations used to research Cyber Security. This bibliography was generated on Cite This For Me on
In-text: (Massive cyber-attack hits 99 countries, 2018)
Your Bibliography: BBC News. 2018. Massive cyber-attack hits 99 countries. [online] Available at: <http://www.bbc.co.uk/news/technology-39901382> [Accessed 22 May 2018].
In-text: (Bordessa, 2018)
Your Bibliography: Bordessa, E., 2018. The real costs of a data breach. [online] IT Governance Blog. Available at: <https://www.itgovernance.co.uk/blog/the-real-costs-of-a-data-breach/> [Accessed 22 May 2018].
In-text: (Burnett, 2006)
Your Bibliography: Burnett, M., 2006. Perfect Password. 1st ed. William Andrew.
In-text: (Colarik, 2006)
Your Bibliography: Colarik, A., 2006. Cyber terrorism. 1st ed. Hershey, PA: Idea Group Pub.
In-text: (Holt, Bossler and Seigfried-Spellar, 2017)
Your Bibliography: Holt, T., Bossler, A. and Seigfried-Spellar, K., 2017. Cybercrime and digital forensics. 1st ed. Routledge.
In-text: (2018)
Your Bibliography: Ics-cert.us-cert.gov. 2018. [online] Available at: <https://ics-cert.us-cert.gov/sites/default/files/documents/10_Basic_Cybersecurity_Measures-WaterISAC_June2015_S508C.pdf> [Accessed 22 May 2018].
In-text: (Keyworth and Wall, 2016)
Your Bibliography: Keyworth, M. and Wall, M., 2016. The 'bogus boss' email scam costing firms millions. [online] BBC News. Available at: <http://www.bbc.com/news/business-35250678> [Accessed 23 May 2018].
In-text: (Mansfield-Devine, 2015)
Your Bibliography: Mansfield-Devine, S., 2015. The Ashley Madison affair. Network Security, [online] 2015(9), pp.8-16. Available at: <https://www-sciencedirect-com.ezproxy.sunderland.ac.uk/science/article/pii/S1353485815300805> [Accessed 21 May 2018].
In-text: (Qian, Tipper, Krishnamurthy and Joshi, 2010)
Your Bibliography: Qian, Y., Tipper, D., Krishnamurthy, P. and Joshi, J., 2010. Information Assurance. 1st ed. Elsevier Science & Technology.
In-text: (What is advanced persistent threat (APT)? - Definition from WhatIs.com, 2018)
Your Bibliography: SearchSecurity. 2018. What is advanced persistent threat (APT)? - Definition from WhatIs.com. [online] Available at: <https://searchsecurity.techtarget.com/definition/advanced-persistent-threat-APT> [Accessed 23 May 2018].
In-text: (The average cost of a Data Breach in 2017 is $3.62 million | Sfax, 2018)
Your Bibliography: Sfax. 2018. The average cost of a Data Breach in 2017 is $3.62 million | Sfax. [online] Available at: <https://www.scrypt.com/blog/average-cost-data-breach-2017-3-62-million/> [Accessed 22 May 2018].
In-text: (Solutions, 2018)
Your Bibliography: Solutions, G., 2018. Why Malware is Still the Biggest Threat to Your Business. [online] Gulfsouthtech.com. Available at: <http://www.gulfsouthtech.com/blog/why-malware-is-still-the-biggest-threat-to-your-business> [Accessed 23 May 2018].
In-text: (Hacktivism 101: A Brief History and Timeline of Notable Incidents - Security News - Trend Micro USA, 2018)
Your Bibliography: Trendmicro.com. 2018. Hacktivism 101: A Brief History and Timeline of Notable Incidents - Security News - Trend Micro USA. [online] Available at: <https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/hacktivism-101-a-brief-history-of-notable-incidents> [Accessed 23 May 2018].
In-text: (Ulsch, 2014)
Your Bibliography: Ulsch, N., 2014. Cyber threat!. 1st ed. Wiley.
In-text: (What is confidentiality, integrity, and availability (CIA triad)? - Definition from WhatIs.com, 2018)
Your Bibliography: WhatIs.com. 2018. What is confidentiality, integrity, and availability (CIA triad)? - Definition from WhatIs.com. [online] Available at: <https://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA> [Accessed 23 May 2018].
10,587 students joined last month!