These are the sources and citations used to research 4-2 Final Project: Milestone Two: Security Policies Development. This bibliography was generated on Cite This For Me on

  • Website

    Top 10 Ways to Prevent Social Engineering Attacks

    2022 - Indusface

    In-text: (Top 10 Ways to Prevent Social Engineering Attacks, 2022)

    Your Bibliography: 2022. Top 10 Ways to Prevent Social Engineering Attacks. [online] Available at: <https://www.indusface.com/blog/10-ways-businesses-can-prevent-social-engineering-attacks/> [Accessed 18 April 2022].

  • Website

    Cassetto, O.

    What is Phishing: 5 Signs of a Phishing Email - Exabeam

    2022

    In-text: (Cassetto, 2022)

    Your Bibliography: Cassetto, O., 2022. What is Phishing: 5 Signs of a Phishing Email - Exabeam. [online] Exabeam. Available at: <https://www.exabeam.com/information-security/what-is-phishing-5-signs-of-a-phishing-email/> [Accessed 18 April 2022].

  • Website

    Unintentional Threats to Information Systems

    2022

    In-text: (Unintentional Threats to Information Systems, 2022)

    Your Bibliography: Ques10.com. 2022. Unintentional Threats to Information Systems. [online] Available at: <https://www.ques10.com/p/48135/unintentional-threats-to-information-systems-1/> [Accessed 17 April 2022].

  • Website

    Password Best Practices | UC Santa Barbara Information Technology

    2022

    In-text: (Password Best Practices | UC Santa Barbara Information Technology, 2022)

    Your Bibliography: UC Santa Barbara Information Technology. 2022. Password Best Practices | UC Santa Barbara Information Technology. [online] Available at: <https://www.it.ucsb.edu/secure-compute-research-environment-user-guide/password-best-practices> [Accessed 18 April 2022].

  • E-book or PDF

    Weber, S., Brosig, B., Newlin, B. and Thompson, C.

    DATA FLOW DIAGRAMS - Mapping Your Way to Better Security

    2022 - YHB’s Risk Advisory Services

    In-text: (Weber, Brosig, Newlin and Thompson, 2022)

    Your Bibliography: Weber, S., Brosig, B., Newlin, B. and Thompson, C., 2022. DATA FLOW DIAGRAMS - Mapping Your Way to Better Security. [ebook] YHB’s Risk Advisory Services, p.23. Available at: <https://yhbcpa.com/wp-content/uploads/2019/06/Data-Flow-Diagrams-by-YHB.pdf> [Accessed 17 April 2022].

  • Website

    Data Flow Diagrams - Mapping Your Way To Better Security - YHB CPAs & Consultants

    2022

    In-text: (Data Flow Diagrams - Mapping Your Way To Better Security - YHB CPAs & Consultants, 2022)

    Your Bibliography: YHB CPAs & Consultants. 2022. Data Flow Diagrams - Mapping Your Way To Better Security - YHB CPAs & Consultants. [online] Available at: <https://yhbcpa.com/de-tech-blog/data-flow-diagrams-mapping-your-way-to-better-security/> [Accessed 17 April 2022].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join