These are the sources and citations used to research 5-2 Information Technology Risk Analysis and Cyber Security Policy Assignment, Part 2. This bibliography was generated on Cite This For Me on

  • E-book or PDF

    DATA SECURITY - Responsibility Report

    2018 - Responsibility Report - Smyrna Ga

    In-text: (DATA SECURITY - Responsibility Report, 2018)

    Your Bibliography: 2018. DATA SECURITY - Responsibility Report. [ebook] Smyrna Ga: Responsibility Report, p.84. Available at: <https://ir.homedepot.com/~/media/Images/H/HomeDepot-IR/Data%20Security_2018.pdf> [Accessed 10 July 2022].

  • Website

    Alexander, J.

    Risk, Threat, or Vulnerability? What's the Difference | Kenna Security

    2021 - Kenna Security

    In-text: (Alexander, 2021)

    Your Bibliography: Alexander, J., 2021. Risk, Threat, or Vulnerability? What's the Difference | Kenna Security. [online] Kenna Security. Available at: <https://www.kennasecurity.com/blog/risk-vs-threat-vs-vulnerability/#:~:text=In%20cybersecurity%2C%20risk%20is%20the,blog%20picks%20apart%20risk%20vs.> [Accessed 10 July 2022].

  • Website

    Larose, C. J. and Buontempo, C. J.

    Data Breaches Can Cost $$ – Plus Ongoing Obligations (ask Home Depot): Lessons and Takeaways

    2022 - Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. All Rights Reserved.

    In-text: (Larose and Buontempo, 2022)

    Your Bibliography: Larose, C. and Buontempo, C., 2022. Data Breaches Can Cost $$ – Plus Ongoing Obligations (ask Home Depot): Lessons and Takeaways. [online] The National Law Review. Available at: <https://www.natlawreview.com/article/data-breaches-can-cost-plus-ongoing-obligations-ask-home-depot-lessons-and-takeaways> [Accessed 11 July 2022].

  • Website

    6 Examples of Essential Cybersecurity Policies for Businesses

    2021 - SecurityScorecard

    In-text: (6 Examples of Essential Cybersecurity Policies for Businesses, 2021)

    Your Bibliography: SecurityScorecard. 2021. 6 Examples of Essential Cybersecurity Policies for Businesses. [online] Available at: <https://securityscorecard.com/blog/cybersecurity-policy-examples#:~:text=A%20cybersecurity%20policy%20establishes%20the,mitigate%20security%20threats%20and%20vulnerabilities.> [Accessed 10 July 2022].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join