These are the sources and citations used to research 5-2 Information Technology Risk Analysis and Cyber Security Policy Assignment, Part 2. This bibliography was generated on Cite This For Me on
In-text: (DATA SECURITY - Responsibility Report, 2018)
Your Bibliography: 2018. DATA SECURITY - Responsibility Report. [ebook] Smyrna Ga: Responsibility Report, p.84. Available at: <https://ir.homedepot.com/~/media/Images/H/HomeDepot-IR/Data%20Security_2018.pdf> [Accessed 10 July 2022].
In-text: (Alexander, 2021)
Your Bibliography: Alexander, J., 2021. Risk, Threat, or Vulnerability? What's the Difference | Kenna Security. [online] Kenna Security. Available at: <https://www.kennasecurity.com/blog/risk-vs-threat-vs-vulnerability/#:~:text=In%20cybersecurity%2C%20risk%20is%20the,blog%20picks%20apart%20risk%20vs.> [Accessed 10 July 2022].
In-text: (Larose and Buontempo, 2022)
Your Bibliography: Larose, C. and Buontempo, C., 2022. Data Breaches Can Cost $$ – Plus Ongoing Obligations (ask Home Depot): Lessons and Takeaways. [online] The National Law Review. Available at: <https://www.natlawreview.com/article/data-breaches-can-cost-plus-ongoing-obligations-ask-home-depot-lessons-and-takeaways> [Accessed 11 July 2022].
In-text: (6 Examples of Essential Cybersecurity Policies for Businesses, 2021)
Your Bibliography: SecurityScorecard. 2021. 6 Examples of Essential Cybersecurity Policies for Businesses. [online] Available at: <https://securityscorecard.com/blog/cybersecurity-policy-examples#:~:text=A%20cybersecurity%20policy%20establishes%20the,mitigate%20security%20threats%20and%20vulnerabilities.> [Accessed 10 July 2022].
10,587 students joined last month!