These are the sources and citations used to research 8-2 Scenario Assignment Module Eight: Strategies of Mitigation. This bibliography was generated on Cite This For Me on
In-text: (Cyber Security - Protecting networks, computers and data, 2022)
Your Bibliography: Bsigroup.com. 2022. Cyber Security - Protecting networks, computers and data. [online] Available at: <https://www.bsigroup.com/en-GB/Cyber-Security/> [Accessed 28 February 2022].
In-text: (Top Routinely Exploited Vulnerabilities | CISA, 2022)
Your Bibliography: Cisa.gov. 2022. Top Routinely Exploited Vulnerabilities | CISA. [online] Available at: <https://www.cisa.gov/uscert/ncas/alerts/aa21-209a> [Accessed 28 February 2022].
In-text: (Hyslop, 2014)
Your Bibliography: Hyslop, M., 2014. Hazards, Risks, and Disasters in Society. [online] Disaster and Development Network (DDN). Available at: <https://www.sciencedirect.com/science/article/pii/B978012396451900010X> [Accessed 28 February 2022].
In-text: (What are web threats?, 2022)
Your Bibliography: What are web threats?. 2022. What are web threats?. [online] Available at: <https://www.kaspersky.com/resource-center/threats/web> [Accessed 27 February 2022].
In-text: (Willis, 2022)
Your Bibliography: Willis, B., 2022. Three Categories of Security Controls. [online] LBMC Family of Companies. Available at: <https://www.lbmc.com/blog/three-categories-of-security-controls/> [Accessed 28 February 2022].
10,587 students joined last month!