These are the sources and citations used to research CSEC 670 Discussion 2. This bibliography was generated on Cite This For Me on

  • E-book or PDF

    A Comprehensive Approach to Managing Social Media Risk and Compliance

    2015

    In-text: (A Comprehensive Approach to Managing Social Media Risk and Compliance, 2015)

    Your Bibliography: A Comprehensive Approach to Managing Social Media Risk and Compliance. (2015). [ebook] Available at: https://www.accenture.com/t20150523T022413__w__/us-en/_acnmedia/Accenture/Conversion-Assets/DotCom/Documents/Global/PDF/Dualpub_1/accenture-comprehensive-approach-managing-social-media-risk-compliance.pdf [Accessed 6 Feb. 2018].

  • Website

    Bayne, J.

    An Overview of Threat and Risk Assessment

    2002

    In-text: (Bayne, 2002)

    Your Bibliography: Bayne, J. (2002). An Overview of Threat and Risk Assessment. [online] FOCUS Forsythe. Available at: https://www.sans.org/reading-room/whitepapers/auditing/overview-threat-risk-assessment-76 [Accessed 9 Feb. 2018].

  • Website

    Belbey, J.

    Protect Your Firm From The 12 Risks of Social Media

    2015

    In-text: (Belbey, 2015)

    Your Bibliography: Belbey, J. (2015). Protect Your Firm From The 12 Risks of Social Media. [online] Forbes.com. Available at: https://www.forbes.com/sites/joannabelbey/2015/05/21/protect-your-firm-from-the-13-risks-of-social-media/#6aecbd9b331e [Accessed 6 Feb. 2018].

  • Website

    Bisson, D.

    5 Social Engineering Attacks to Watch Out For

    2015

    In-text: (Bisson, 2015)

    Your Bibliography: Bisson, D. (2015). 5 Social Engineering Attacks to Watch Out For. [online] The State of Security. Available at: https://www.tripwire.com/state-of-security/security-awareness/5-social-engineering-attacks-to-watch-out-for/ [Accessed 6 Feb. 2018].

  • Website

    Burnette, M.

    Are your administrators using admin accounts for everything?

    2017

    In-text: (Burnette, 2017)

    Your Bibliography: Burnette, M. (2017). Are your administrators using admin accounts for everything?. [online] Lbmcinformationsecurity.com. Available at: https://www.lbmcinformationsecurity.com/blog/are-your-administrators-using-admin-accounts-for-everything [Accessed 8 Feb. 2018].

  • E-book or PDF

    Cyber Risk – A Global Systemic Threat

    2014 - DTCC

    In-text: (Cyber Risk – A Global Systemic Threat, 2014)

    Your Bibliography: Cyber Risk – A Global Systemic Threat. (2014). [ebook] DTCC. Available at: http://dtcc.com/~/media/Files/Downloads/issues/risk/Systemic_Risk_Summary_Report.ashx [Accessed 8 Feb. 2018].

  • Website

    Deutscher, S.

    7 steps to reducing the risk of a cyber attack

    2015

    In-text: (Deutscher, 2015)

    Your Bibliography: Deutscher, S. (2015). 7 steps to reducing the risk of a cyber attack. [online] World Economic Forum. Available at: https://www.weforum.org/agenda/2015/05/7-steps-to-reducing-the-risk-of-a-cyber-attack/ [Accessed 8 Feb. 2018].

  • Website

    Elkind, P.

    Sony Pictures: Inside the Hack of the Century

    2015

    In-text: (Elkind, 2015)

    Your Bibliography: Elkind, P. (2015). Sony Pictures: Inside the Hack of the Century. [online] Fortune. Available at: http://fortune.com/sony-hack-part-1/ [Accessed 6 Feb. 2018].

  • Website

    Anatomy of an APT (Advanced Persistent Threat) Attack | FireEye

    In-text: (FireEye, n.d.)

    Your Bibliography: FireEye. (n.d.). Anatomy of an APT (Advanced Persistent Threat) Attack | FireEye. [online] Available at: https://www.fireeye.com/current-threats/anatomy-of-a-cyber-attack.html [Accessed 6 Feb. 2018].

  • Website

    Goodchild, J.

    Security and vulnerability assessment: 4 common mistakes

    2013

    In-text: (Goodchild, 2013)

    Your Bibliography: Goodchild, J. (2013). Security and vulnerability assessment: 4 common mistakes. [online] CSO Online. Available at: https://www.csoonline.com/article/2133245/government/security-and-vulnerability-assessment-4-common-mistakes.html [Accessed 9 Feb. 2018].

  • Website

    Koerner, B.

    Inside the OPM Hack, the Cyberattack That Shocked the US Government

    2016

    In-text: (Koerner, 2016)

    Your Bibliography: Koerner, B. (2016). Inside the OPM Hack, the Cyberattack That Shocked the US Government. [online] WIRED. Available at: https://www.wired.com/2016/10/inside-cyberattack-shocked-us-government/ [Accessed 6 Feb. 2018].

  • Website

    Lord, N.

    What is an Advanced Persistent Threat? APT Definition

    2017

    In-text: (Lord, 2017)

    Your Bibliography: Lord, N. (2017). What is an Advanced Persistent Threat? APT Definition. [online] Digital Guardian. Available at: https://digitalguardian.com/blog/what-advanced-persistent-threat-apt-definition [Accessed 6 Feb. 2018].

  • Website

    Martin-Vegue, T.

    What's the difference between a vulnerability scan, penetration test and a risk analysis?

    2015

    In-text: (Martin-Vegue, 2015)

    Your Bibliography: Martin-Vegue, T. (2015). What's the difference between a vulnerability scan, penetration test and a risk analysis?. [online] CSO Online. Available at: https://www.csoonline.com/article/2921148/security/whats-the-difference-between-a-vulnerability-scan-penetration-test-and-a-risk-analysis.html [Accessed 9 Feb. 2018].

  • Website

    Oltsik, J.

    Why companies don't adopt new enterprise security technologies

    2017

    In-text: (Oltsik, 2017)

    Your Bibliography: Oltsik, J. (2017). Why companies don't adopt new enterprise security technologies. [online] CSO Online. Available at: https://www.csoonline.com/article/3231662/security/whats-holding-back-enterprise-security-technology-transformation.html [Accessed 9 Feb. 2018].

  • E-book or PDF

    Pingree, L. and MacDonald, N.

    Best Practices for Mitigating Advanced Persistent Threats

    2012

    In-text: (Pingree and MacDonald, 2012)

    Your Bibliography: Pingree, L. and MacDonald, N. (2012). Best Practices for Mitigating Advanced Persistent Threats. [ebook] Available at: http://www.trendmicro.de/media/wp/gartner-best-practices-for-mitigating-apts-whitepaper-en.pdf [Accessed 6 Feb. 2018].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Super fast and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use our extensive Premium features (Plagiarism checks, Word Add On...)
  • ✔ Create and edit multiple bibliographies
Join