These are the sources and citations used to research 4-2 Final Project Milestone Two - Information Security Roles and Responsibilities. This bibliography was generated on Cite This For Me on
In-text: (Legal, Ethical, and Professional Issues in Information Security, 1962)
Your Bibliography: Content.grantham.edu. 1962. Legal, Ethical, and Professional Issues in Information Security. [online] Available at: <https://content.grantham.edu/at/IS211/ch03.pdf> [Accessed 30 January 2022].
In-text: (Cullina, 2018)
Your Bibliography: Cullina, M., 2018. The Importance of Information Security Plans | JD Supra. [online] JD Supra. Available at: <https://www.jdsupra.com/legalnews/the-importance-of-information-security-36039/> [Accessed 30 January 2022].
In-text: (Information Assurance (IA): definition & explanation | IT Governance USA, 2022)
Your Bibliography: Itgovernanceusa.com. 2022. Information Assurance (IA): definition & explanation | IT Governance USA. [online] Available at: <https://www.itgovernanceusa.com/information/information-assurance> [Accessed 30 January 2022].
In-text: (What Is The Biggest Threat To Information Security?, 2022)
Your Bibliography: Mainstream Technologies. 2022. What Is The Biggest Threat To Information Security?. [online] Available at: <https://www.mainstream-tech.com/what-is-the-biggest-threat-to-security/> [Accessed 30 January 2022].
10,587 students joined last month!