These are the sources and citations used to research 2-2 Final Project Milestone One: Proposal Introduction/IT 552 Milestone One. This bibliography was generated on Cite This For Me on

  • Website

    What is a Cyber Security Framework: Types, Benefits, and Best Practices

    2022 - Simplilearn

    In-text: (What is a Cyber Security Framework: Types, Benefits, and Best Practices, 2022)

    Your Bibliography: 2022. What is a Cyber Security Framework: Types, Benefits, and Best Practices. [online] Available at: <https://www.simplilearn.com/what-is-a-cyber-security-framework-article#:~:text=Cyber%20security%20frameworks%20are%20sets,other%20cyber%20criminals%20may%20exploit.> [Accessed 3 April 2022].

  • Website

    Human and organizational factors in computer and information security: Pathways to vulnerabil

    2009 - ScienceDirect

    In-text: (Human and organizational factors in computer and information security: Pathways to vulnerabil, 2009)

    Your Bibliography: Computers & Security. 2009. Human and organizational factors in computer and information security: Pathways to vulnerabil. [online] Available at: <https://www.sciencedirect.com/science/article/pii/S0167404809000467#:~:text=The%20factors%20were%20categorized%20into,issues%2C%20technology%2C%20and%20training.> [Accessed 3 April 2022].

  • Website

    The Human Factor: The Hidden Problem of Cybersecurity - CYDEF

    2022

    In-text: (The Human Factor: The Hidden Problem of Cybersecurity - CYDEF, 2022)

    Your Bibliography: CYDEF. 2022. The Human Factor: The Hidden Problem of Cybersecurity - CYDEF. [online] Available at: <https://cydef.ca/blog/the-human-factor-the-hidden-problem-of-cybersecurity/#:~:text=Human%20Factor%20in%20Cybersecurity,of%20human%20errors%20adds%20up.> [Accessed 3 April 2022].

  • Website

    Disabling peer-to-peer file sharing: File sharing & copyright: Personal Preparedness: Information Security & Policy: Indiana University

    2022

    In-text: (Disabling peer-to-peer file sharing: File sharing & copyright: Personal Preparedness: Information Security & Policy: Indiana University, 2022)

    Your Bibliography: Information Security & Policy. 2022. Disabling peer-to-peer file sharing: File sharing & copyright: Personal Preparedness: Information Security & Policy: Indiana University. [online] Available at: <https://informationsecurity.iu.edu/personal-preparedness/file-sharing/disable.html> [Accessed 3 April 2022].

  • Website

    U.S. Code: Title 17

    2022

    In-text: (U.S. Code: Title 17, 2022)

    Your Bibliography: LII / Legal Information Institute. 2022. U.S. Code: Title 17. [online] Available at: <https://www.law.cornell.edu/uscode/text/17> [Accessed 7 April 2022].

  • Website

    Office, U.

    The Digital Millennium Copyright Act | U.S. Copyright Office

    2022

    In-text: (Office, 2022)

    Your Bibliography: Office, U., 2022. The Digital Millennium Copyright Act | U.S. Copyright Office. [online] Copyright.gov. Available at: <https://www.copyright.gov/dmca/> [Accessed 7 April 2022].

  • Website

    What is Continuous Cybersecurity Monitoring? l SecurityScorecard

    2022

    In-text: (What is Continuous Cybersecurity Monitoring? l SecurityScorecard, 2022)

    Your Bibliography: SecurityScorecard. 2022. What is Continuous Cybersecurity Monitoring? l SecurityScorecard. [online] Available at: <https://securityscorecard.com/blog/what-is-continuous-cybersecurity-monitoring#:~:text=A%20continuous%20monitoring%20plan%20formalizes,to%20new%20risks%20or%20threats.> [Accessed 3 April 2022].

  • Website

    Dangers of Peer-to-Peer Networking

    2022

    In-text: (Dangers of Peer-to-Peer Networking, 2022)

    Your Bibliography: Sites.cns.utexas.edu. 2022. Dangers of Peer-to-Peer Networking. [online] Available at: <https://sites.cns.utexas.edu/oit-blog/blog/dangers-peer-peer-networking> [Accessed 7 April 2022].

  • Website

    T&amp;M Protection Resources, L.

    How to Enforce a Cyber Security Policy

    2022

    In-text: (T&amp;M Protection Resources, 2022)

    Your Bibliography: T&amp;M Protection Resources, L., 2022. How to Enforce a Cyber Security Policy. [online] Tmusallc.com. Available at: <https://www.tmusallc.com/blog/how-to-enforce-a-cyber-security-policy> [Accessed 7 April 2022].

  • Website

    Cybersecurity Communications

    2022

    In-text: (Cybersecurity Communications, 2022)

    Your Bibliography: Tucker/Hall. 2022. Cybersecurity Communications. [online] Available at: <https://tuckerhall.com/practices/digital/cybersecurity-communications/#:~:text=A%20solid%20cybersecurity%20communications%20strategy,back%20to%20business%20as%20usual.> [Accessed 3 April 2022].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join