These are the sources and citations used to research Cyber Security Assignment 1. This bibliography was generated on Cite This For Me on

  • Website

    Ali, S.

    6 Steps Risk Management Approach

    2016

    In-text: (Ali, 2016)

    Your Bibliography: Ali, S., 2016. 6 Steps Risk Management Approach. [online] Sheraz-ali.com. Available at: <https://www.sheraz-ali.com/Blog/files/6b05d547c39af8ce6babd9e94b71fab0-4.html> [Accessed 1 May 2018].

  • Website

    NHS trusts 'at fault' over cyber-attack

    2017

    In-text: (NHS trusts 'at fault' over cyber-attack, 2017)

    Your Bibliography: BBC News. 2017. NHS trusts 'at fault' over cyber-attack. [online] Available at: <http://www.bbc.co.uk/news/technology-41753022> [Accessed 1 May 2018].

  • Website

    Fines for firms with poor cyber-security

    2018

    In-text: (Fines for firms with poor cyber-security, 2018)

    Your Bibliography: BBC News. 2018. Fines for firms with poor cyber-security. [online] Available at: <http://www.bbc.co.uk/news/technology-42861676> [Accessed 1 May 2018].

  • Website

    Creating a cyber security policy for your business

    2017

    In-text: (Creating a cyber security policy for your business, 2017)

    Your Bibliography: Business.gov.au. 2017. Creating a cyber security policy for your business. [online] Available at: <https://www.business.gov.au/info/run/cyber-security/creating-a-cyber-security-policy-for-your-business> [Accessed 1 May 2018].

  • Website

    DuPaul, N.

    Common Malware Types: Cybersecurity 101

    2012

    In-text: (DuPaul, 2012)

    Your Bibliography: DuPaul, N., 2012. Common Malware Types: Cybersecurity 101. [online] Veracode. Available at: <https://www.veracode.com/blog/2012/10/common-malware-types-cybersecurity-101> [Accessed 1 May 2018].

  • Website

    Gilbert-Knight, A.

    Protecting Your Organization from Spyware, Viruses, and Other Malware

    2012

    In-text: (Gilbert-Knight, 2012)

    Your Bibliography: Gilbert-Knight, A., 2012. Protecting Your Organization from Spyware, Viruses, and Other Malware. [online] Techsoup.org. Available at: <https://www.techsoup.org/support/articles-and-how-tos/protecting-your-organization-from-spyware> [Accessed 1 May 2018].

  • Website

    Vulnerability Checklist

    2013

    In-text: (Vulnerability Checklist, 2013)

    Your Bibliography: Hitsinstitute.com. 2013. Vulnerability Checklist. [online] Available at: <http://www.hitsinstitute.com/category/security/physical-security/> [Accessed 2 May 2018].

  • Website

    What Are Security Patches and Why Are They Important?

    2017

    In-text: (What Are Security Patches and Why Are They Important?, 2017)

    Your Bibliography: Identity Theft Resource Center. 2017. What Are Security Patches and Why Are They Important?. [online] Available at: <https://www.idtheftcenter.org/Cybersecurity/what-are-security-patches-and-why-are-they-important.html> [Accessed 1 May 2018].

  • Website

    What is cyber security? – IT Governance

    2003

    In-text: (What is cyber security? – IT Governance, 2003)

    Your Bibliography: Itgovernance.co.uk. 2003. What is cyber security? – IT Governance. [online] Available at: <https://www.itgovernance.co.uk/what-is-cybersecurity> [Accessed 1 May 2018].

  • Website

    Anon

    2018

    In-text: (2018)

    Your Bibliography: Kaspersky.co.uk. 2018. [online] Available at: <https://www.kaspersky.co.uk/resource-center/preemptive-safety/what-is-malware-and-how-to-protect-against-it> [Accessed 1 May 2018].

  • Website

    What is a risk matrix? – Knowledge Base

    In-text: (What is a risk matrix? – Knowledge Base, n.d.)

    Your Bibliography: microTOOL. n.d. What is a risk matrix? – Knowledge Base. [online] Available at: <https://www.microtool.de/en/what-is-a-risk-matrix/> [Accessed 2 May 2018].

  • Website

    Protecting your organisation from malware - NCSC Site

    2018

    In-text: (Protecting your organisation from malware - NCSC Site, 2018)

    Your Bibliography: Ncsc.gov.uk. 2018. Protecting your organisation from malware - NCSC Site. [online] Available at: <https://www.ncsc.gov.uk/guidance/protecting-your-organisation-malware> [Accessed 1 May 2018].

  • Website

    5 Critical Reasons for Network Traffic Analysis - Netmon

    2016

    In-text: (5 Critical Reasons for Network Traffic Analysis - Netmon, 2016)

    Your Bibliography: Netmon. 2016. 5 Critical Reasons for Network Traffic Analysis - Netmon. [online] Available at: <http://www.netmon.com/5-critical-reasons-network-traffic-analysis/> [Accessed 1 May 2018].

  • Website

    NVD - Vulnerability Metrics

    In-text: (NVD - Vulnerability Metrics, n.d.)

    Your Bibliography: Nvd.nist.gov. n.d. NVD - Vulnerability Metrics. [online] Available at: <https://nvd.nist.gov/vuln-metrics/cvss> [Accessed 2 May 2018].

  • Website

    The UK’s biggest cybersecurity and data breaches in 2017 (so far)

    2011

    In-text: (The UK’s biggest cybersecurity and data breaches in 2017 (so far), 2011)

    Your Bibliography: PolicyBee. 2011. The UK’s biggest cybersecurity and data breaches in 2017 (so far). [online] Available at: <https://www.policybee.co.uk/blog/13456/uk-biggest-cybersecurity-and-data-breaches-in-2017> [Accessed 1 May 2018].

  • Website

    Rouse, M., Clark, C. and Cobb, M.

    What is firewall?

    2018

    In-text: (Rouse, Clark and Cobb, 2018)

    Your Bibliography: Rouse, M., Clark, C. and Cobb, M., 2018. What is firewall?. [online] SearchSecurity. Available at: <https://searchsecurity.techtarget.com/definition/firewall> [Accessed 2 May 2018].

  • Website

    Shinder, D.

    10 physical security measures every organization should take

    2016

    In-text: (Shinder, 2016)

    Your Bibliography: Shinder, D., 2016. 10 physical security measures every organization should take. [online] TechRepublic. Available at: <https://www.techrepublic.com/blog/10-things/10-physical-security-measures-every-organization-should-take/> [Accessed 3 May 2018].

  • Website

    37 Powerful Penetration Testing Tools For Every Penetration Tester — Software Testing Help

    2018

    In-text: (37 Powerful Penetration Testing Tools For Every Penetration Tester — Software Testing Help, 2018)

    Your Bibliography: Softwaretestinghelp.com. 2018. 37 Powerful Penetration Testing Tools For Every Penetration Tester — Software Testing Help. [online] Available at: <https://www.softwaretestinghelp.com/penetration-testing-tools/> [Accessed 2 May 2018].

  • Website

    Taylor, S.

    VoIP network security protocols: Is VoIP secure?

    2003

    In-text: (Taylor, 2003)

    Your Bibliography: Taylor, S., 2003. VoIP network security protocols: Is VoIP secure?. [online] SearchSecurity. Available at: <https://searchsecurity.techtarget.com/VoIP-network-security-protocols-Is-VoIP-secure> [Accessed 2 May 2018].

  • Website

    What is an Access Control List (ACL)? - Definition from Techopedia

    In-text: (What is an Access Control List (ACL)? - Definition from Techopedia, n.d.)

    Your Bibliography: Techopedia.com. n.d. What is an Access Control List (ACL)? - Definition from Techopedia. [online] Available at: <https://www.techopedia.com/definition/24766/access-control-list-acl> [Accessed 2 May 2018].

  • Website

    What Is A Botnet?

    In-text: (What Is A Botnet?, n.d.)

    Your Bibliography: Uk.norton.com. n.d. What Is A Botnet?. [online] Available at: <https://uk.norton.com/internetsecurity-malware-what-is-a-botnet.html> [Accessed 1 May 2018].

  • Website

    What Is A Computer Virus?

    In-text: (What Is A Computer Virus?, n.d.)

    Your Bibliography: Uk.norton.com. n.d. What Is A Computer Virus?. [online] Available at: <https://uk.norton.com/internetsecurity-malware-what-is-a-computer-virus.html> [Accessed 1 May 2018].

  • Website

    van den Hoven, J., Blaauw, M., Pieters, W. and Warnier, M.

    Privacy and Information Technology

    2014

    In-text: (van den Hoven, Blaauw, Pieters and Warnier, 2014)

    Your Bibliography: van den Hoven, J., Blaauw, M., Pieters, W. and Warnier, M., 2014. Privacy and Information Technology. [online] Plato.stanford.edu. Available at: <https://plato.stanford.edu/entries/it-privacy/#BigDat> [Accessed 1 May 2018].

  • Website

    Watts, S.

    IT Security Vulnerability vs Threat vs Risk: What’s the Difference?

    2017

    In-text: (Watts, 2017)

    Your Bibliography: Watts, S., 2017. IT Security Vulnerability vs Threat vs Risk: What’s the Difference?. [online] Bmc.com. Available at: <http://www.bmc.com/blogs/security-vulnerability-vs-threat-vs-risk-whats-difference/> [Accessed 1 May 2018].

  • Website

    Yip, K. N.

    How Security Awareness Training Can Save You From The Horror Of Malware

    In-text: (Yip, n.d.)

    Your Bibliography: Yip, K., n.d. How Security Awareness Training Can Save You From The Horror Of Malware. [online] infosecinstitute.com. Available at: <http://resources.infosecinstitute.com/category/enterprise/securityawareness/employee-security-threats/security-awareness-and-malware/#gref> [Accessed 1 May 2018].

  • Website

    Zamora, W.

    What are exploits? (And why you should care) - Malwarebytes Labs

    2017

    In-text: (Zamora, 2017)

    Your Bibliography: Zamora, W., 2017. What are exploits? (And why you should care) - Malwarebytes Labs. [online] Malwarebytes Labs. Available at: <https://blog.malwarebytes.com/101/2017/03/what-are-exploits-and-why-you-should-care> [Accessed 1 May 2018].

  • Website

    4 Steps To Combat Malware Enterprise-Wide

    In-text: (4 Steps To Combat Malware Enterprise-Wide, n.d.)

    Your Bibliography: Zeltser.com. n.d. 4 Steps To Combat Malware Enterprise-Wide. [online] Available at: <https://zeltser.com/malware-in-the-enterprise> [Accessed 1 May 2018].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join