These are the sources and citations used to research 2-2 Final Project Milestone One: Proposal Introduction/IT 552 Milestone One. This bibliography was generated on Cite This For Me on
In-text: (What is a Cyber Security Framework: Types, Benefits, and Best Practices, 2022)
Your Bibliography: 2022. What is a Cyber Security Framework: Types, Benefits, and Best Practices. [online] Available at: <https://www.simplilearn.com/what-is-a-cyber-security-framework-article#:~:text=Cyber%20security%20frameworks%20are%20sets,other%20cyber%20criminals%20may%20exploit.> [Accessed 3 April 2022].
In-text: (Human and organizational factors in computer and information security: Pathways to vulnerabil, 2009)
Your Bibliography: Computers & Security. 2009. Human and organizational factors in computer and information security: Pathways to vulnerabil. [online] Available at: <https://www.sciencedirect.com/science/article/pii/S0167404809000467#:~:text=The%20factors%20were%20categorized%20into,issues%2C%20technology%2C%20and%20training.> [Accessed 3 April 2022].
In-text: (The Human Factor: The Hidden Problem of Cybersecurity - CYDEF, 2022)
Your Bibliography: CYDEF. 2022. The Human Factor: The Hidden Problem of Cybersecurity - CYDEF. [online] Available at: <https://cydef.ca/blog/the-human-factor-the-hidden-problem-of-cybersecurity/#:~:text=Human%20Factor%20in%20Cybersecurity,of%20human%20errors%20adds%20up.> [Accessed 3 April 2022].
In-text: (Disabling peer-to-peer file sharing: File sharing & copyright: Personal Preparedness: Information Security & Policy: Indiana University, 2022)
Your Bibliography: Information Security & Policy. 2022. Disabling peer-to-peer file sharing: File sharing & copyright: Personal Preparedness: Information Security & Policy: Indiana University. [online] Available at: <https://informationsecurity.iu.edu/personal-preparedness/file-sharing/disable.html> [Accessed 3 April 2022].
In-text: (U.S. Code: Title 17, 2022)
Your Bibliography: LII / Legal Information Institute. 2022. U.S. Code: Title 17. [online] Available at: <https://www.law.cornell.edu/uscode/text/17> [Accessed 7 April 2022].
In-text: (Office, 2022)
Your Bibliography: Office, U., 2022. The Digital Millennium Copyright Act | U.S. Copyright Office. [online] Copyright.gov. Available at: <https://www.copyright.gov/dmca/> [Accessed 7 April 2022].
In-text: (What is Continuous Cybersecurity Monitoring? l SecurityScorecard, 2022)
Your Bibliography: SecurityScorecard. 2022. What is Continuous Cybersecurity Monitoring? l SecurityScorecard. [online] Available at: <https://securityscorecard.com/blog/what-is-continuous-cybersecurity-monitoring#:~:text=A%20continuous%20monitoring%20plan%20formalizes,to%20new%20risks%20or%20threats.> [Accessed 3 April 2022].
In-text: (Dangers of Peer-to-Peer Networking, 2022)
Your Bibliography: Sites.cns.utexas.edu. 2022. Dangers of Peer-to-Peer Networking. [online] Available at: <https://sites.cns.utexas.edu/oit-blog/blog/dangers-peer-peer-networking> [Accessed 7 April 2022].
In-text: (T&M Protection Resources, 2022)
Your Bibliography: T&M Protection Resources, L., 2022. How to Enforce a Cyber Security Policy. [online] Tmusallc.com. Available at: <https://www.tmusallc.com/blog/how-to-enforce-a-cyber-security-policy> [Accessed 7 April 2022].
In-text: (Cybersecurity Communications, 2022)
Your Bibliography: Tucker/Hall. 2022. Cybersecurity Communications. [online] Available at: <https://tuckerhall.com/practices/digital/cybersecurity-communications/#:~:text=A%20solid%20cybersecurity%20communications%20strategy,back%20to%20business%20as%20usual.> [Accessed 3 April 2022].
10,587 students joined last month!