These are the sources and citations used to research 5220.Cloud.ICAM.Summer2018.Webster.U.Davis. This bibliography was generated on Cite This For Me on

  • Website

    Datasets - Data.gov

    2018 - U.S. Government

    284,717 datasets found

    In-text: (Datasets - Data.gov, 2018)

    Your Bibliography: Catalog.data.gov. 2018. Datasets - Data.gov. [online] Available at: <https://catalog.data.gov/dataset> [Accessed 24 June 2018].

  • Website

    ICAM Products and Resources

    2018 - National Council of Statewide Interoperability Coordinators (NCSWIC) and the Department of Homeland Security

    In-text: (ICAM Products and Resources, 2018)

    Your Bibliography: Department of Homeland Security. 2018. ICAM Products and Resources. [online] Available at: <https://www.dhs.gov/publication/icam-products-and-resources> [Accessed 24 June 2018].

  • Report

    Gartner, Inc. (NYSE: IT)

    How to Respond to the 2018 Threat Landscape

    2017 - Gartner, Inc. (NYSE: IT) - New York

    Recommendations Security and risk management leaders focused on cloud and emerging technology security should: Balance the widespread emphasis on detection with prevention by concentrating on basic functions, including patch-oriented security practices and system hardening. Assess the viability of rearchitecting in security planning by using enclaves, segmenting, remote browsers and any known weak links that could enable an "enterprise-killer" attack. Plan to purchase and use actionable threat intelligence (TI) to understand the specific challenges to the specific technologies utilized by business practices. Conduct an immediate assessment of your vulnerability management program and include looking for shadow IT that needs inclusion into that program. Monitor encrypted traffic to catch sophisticated hackers who hide complex attacks in web traffic. Include outsourcing of security functions in your practice; pressure existing EPP vendors to provide ransomware detection or switch vendors. Ensure that backups are being performed.

    In-text: (Gartner, Inc. (NYSE: IT), 2017)

    Your Bibliography: Gartner, Inc. (NYSE: IT), 2017. How to Respond to the 2018 Threat Landscape. Published: 28 November 2017 ID: G00335145. [online] New York: Gartner, Inc. (NYSE: IT). Available at: <https://www.gartner.com/document/3830130?ref=lib> [Accessed 24 June 2018].

  • Book

    Hubbard, R. G. and O'Brien, A. P.

    Macroeconomics

    2017 - Pearson Education - Boston

    In-text: (Hubbard and O'Brien, 2017)

    Your Bibliography: Hubbard, R. and O'Brien, A., 2017. Macroeconomics. 6th ed. Boston: Pearson Education.

  • Website

    Linthicum, D.

    Cloud security lessons from the Equifax breach

    2017 - InfoWorld from IDG

    However, despite what you may hear from some cloud vendors and consultants or the press, being in the cloud does not make you immune from breaches. For example, cloud users themselves could make key mistakes in a single-tenant environment (hosting, for example), so applications running in the public cloud are not completely immune from breaches.

    In-text: (Linthicum, 2017)

    Your Bibliography: Linthicum, D., 2017. Cloud security lessons from the Equifax breach. [online] InfoWorld. Available at: <https://www.infoworld.com/article/3225479/cloud-computing/safer-but-not-immune-cloud-lessons-from-the-equifax-breach.html> [Accessed 23 June 2018].

  • Website

    McLellan, C.

    IT budgets 2017-18: What the surveys tell us | ZDNet

    2016 - ZDNet

    In North America at any rate, the expectation from this survey is that organisations will spend more of their IT budgets on business applications (especially SaaS) and networks, and less on client devices and data centres. Although IT department headcounts are not rising to any great extent, Computer Economics expects more spending on "talent, especially managers and developers who can lead the transition to cloud, mobility, and big data solutions." Harvey Nash/KPMG CIO Survey 2016

    In-text: (McLellan, 2016)

    Your Bibliography: McLellan, C., 2016. IT budgets 2017-18: What the surveys tell us | ZDNet. [online] ZDNet. Available at: <http://www.zdnet.com/article/it-budgets-2017-18-what-the-surveys-tell-us/> [Accessed 23 February 2018].

  • Govt. publication

    Office of U.S. Senator Elizabeth Warren

    Bad Credit: Uncovering Equifax's Failure to Protect Americans' Personal Information

    2018 - Office of U.S. Senator Elizabeth Warren - Washington

    Equifax was making huge profits but failing to protect consumers’ data safety and security. Equifax adopted ineffective cybersecurity measures for sensitive data belonging to millions of Americans. As a company that has “data on approaching a billion people,” and “manage[s] massive amounts of very unique data,” as CEO Rick Smith put it two weeks after learning of the breach, Equifax failed to take the necessary efforts to protect that data.

    In-text: (Office of U.S. Senator Elizabeth Warren, 2018)

    Your Bibliography: Office of U.S. Senator Elizabeth Warren, 2018. Bad Credit: Uncovering Equifax's Failure to Protect Americans' Personal Information. Washington: Office of U.S. Senator Elizabeth Warren, pp.1-4.

  • Book

    Pfleeger, C. P. and Pfleeger, S. L.

    Analyzing computer security

    2012 - Prentice Hall - Upper Saddle River, NJ

    In-text: (Pfleeger and Pfleeger, 2012)

    Your Bibliography: Pfleeger, C. and Pfleeger, S., 2012. Analyzing computer security. Upper Saddle River, NJ: Prentice Hall, p.40.

  • Book

    Pfleeger, C. P. and Pfleeger, S. L.

    Analyzing computer security

    2012 - Prentice Hall - Upper Saddle River, NJ

    In-text: (Pfleeger and Pfleeger, 2012)

    Your Bibliography: Pfleeger, C. and Pfleeger, S., 2012. Analyzing computer security. Upper Saddle River, NJ: Prentice Hall, pp.210-215.

  • Book

    Pfleeger, C. P. and Pfleeger, S. L.

    Analyzing computer security

    2012 - Prentice Hall - Upper Saddle River, NJ

    In-text: (Pfleeger and Pfleeger, 2012)

    Your Bibliography: Pfleeger, C. and Pfleeger, S., 2012. Analyzing computer security. Upper Saddle River, NJ: Prentice Hall, pp.30-66.

  • Website

    Roberts, J. A.

    Why is scarcity important in economics?

    2018

    In-text: (Roberts, 2018)

    Your Bibliography: Roberts, J., 2018. Why is scarcity important in economics?. [online] Quora. Available at: <https://www.quora.com/Why-is-scarcity-important-in-economics> [Accessed 2 July 2018].

  • Book

    Ruparelia, N. B.

    Cloud computings

    2016 - MIT Press - Cambridge, MA

    In-text: (Ruparelia, 2016)

    Your Bibliography: Ruparelia, N., 2016. Cloud computings. Cambridge, MA: MIT Press, pp.99-122.

  • Report

    Webster University, CSSS500 Research Paper

    Cloud Security Comparison for National Security Information

    2018 - Woodbridge

    In-text: (Webster University, CSSS500 Research Paper, 2018)

    Your Bibliography: Webster University, CSSS500 Research Paper, 2018. Cloud Security Comparison for National Security Information. Woodbridge, p.5.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join