These are the sources and citations used to research 6-2 Scenario Assignment Module Six: Gathering Quantities Data. This bibliography was generated on Cite This For Me on
In-text: (Academy and disclosure, 2022)
Your Bibliography: Academy, W. and disclosure, I., 2022. Information disclosure vulnerabilities | Web Security Academy. [online] Portswigger.net. Available at: <https://portswigger.net/web-security/information-disclosure#:~:text=Information%20disclosure%2C%20also%20known%20as,as%20usernames%20or%20financial%20information> [Accessed 13 February 2022].
In-text: (Understanding Denial-of-Service Attacks | CISA, 2022)
Your Bibliography: Cisa.gov. 2022. Understanding Denial-of-Service Attacks | CISA. [online] Available at: <https://www.cisa.gov/uscert/ncas/tips/ST04-015> [Accessed 13 February 2022].
In-text: (Privilege Escalation, 2022)
Your Bibliography: Cynet. 2022. Privilege Escalation. [online] Available at: <https://www.cynet.com/network-attacks/privilege-escalation/> [Accessed 13 February 2022].
In-text: (Threat Modeling: Designing for Security, 2022)
Your Bibliography: O’Reilly Online Learning. 2022. Threat Modeling: Designing for Security. [online] Available at: <https://www.oreilly.com/library/view/threat-modeling-designing/9781118810057/9781118810057c03.xhtml> [Accessed 13 February 2022].
In-text: (Top 10 Types of Spoofing Attacks (and How to Protect your Data) - TGVT, 2022)
Your Bibliography: TGVT. 2022. Top 10 Types of Spoofing Attacks (and How to Protect your Data) - TGVT. [online] Available at: <https://tgvt.net/types-of-spoofing-attacks/> [Accessed 13 February 2022].
In-text: (Everything you need to know about cybersecurity in 2022, 2022)
Your Bibliography: World Economic Forum. 2022. Everything you need to know about cybersecurity in 2022. [online] Available at: <https://www.weforum.org/agenda/2022/01/cyber-security-2022-global-outlook/> [Accessed 14 February 2022].
10,587 students joined last month!