These are the sources and citations used to research BSc-Network Sec.. This bibliography was generated on Cite This For Me on

  • Website

    BBC

    Threats to networks - System security - OCR - GCSE Computer Science Revision - OCR - BBC Bitesize

    2021 - BBC

    In-text: (BBC, 2021)

    Your Bibliography: BBC, 2021. Threats to networks - System security - OCR - GCSE Computer Science Revision - OCR - BBC Bitesize. [online] BBC Bitesize. Available at: <https://www.bbc.co.uk/bitesize/guides/zj89dxs/revision/2> [Accessed 8 May 2022].

  • Website

    cisco.com

    IPSec Network Security Commands

    2007 - cisco.com

    In-text: (cisco.com, 2007)

    Your Bibliography: cisco.com, 2007. IPSec Network Security Commands. [online] cisco.com. Available at: <https://www.cisco.com/c/en/us/td/docs/ios/12_2/security/command/reference/srfipsec.html> [Accessed 5 May 2022].

  • Website

    cisco.com

    Cisco Catalyst 2960-X Series Switches

    2017 - www.cisco.com

    In-text: (cisco.com, 2017)

    Your Bibliography: cisco.com, 2017. Cisco Catalyst 2960-X Series Switches. [online] www.cisco.com. Available at: <https://www.cisco.com/c/en/us/support/switches/catalyst-2960-x-series-switches/series.html> [Accessed 6 May 2022].

  • Website

    cisco.com

    Cisco ASA 5505 Adaptive Security Appliance for Small Office or Branch Locations Data Sheet

    2018 - cisco.com

    In-text: (cisco.com, 2018)

    Your Bibliography: cisco.com, 2018. Cisco ASA 5505 Adaptive Security Appliance for Small Office or Branch Locations Data Sheet. [online] www.cisco.com. Available at: <https://www.cisco.com/c/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/datasheet-c78-733510.html> [Accessed 6 May 2022].

  • Website

    cisco.com

    Security for VPNs with IPsec Configuration Guide, Cisco IOS XE Release 3S - Configuring Security for VPNs with IPsec [Support]

    2018 - cisco.com

    In-text: (cisco.com, 2018)

    Your Bibliography: cisco.com, 2018. Security for VPNs with IPsec Configuration Guide, Cisco IOS XE Release 3S - Configuring Security for VPNs with IPsec [Support]. [online] cisco.com. Available at: <https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnips/configuration/xe-3s/sec-sec-for-vpns-w-ipsec-xe-3s-book/sec-cfg-vpn-ipsec.html> [Accessed 5 May 2022].

  • Website

    cisco.com

    Cisco 1900 Series Integrated Services Routers

    2021 - cisco.com

    In-text: (cisco.com, 2021)

    Your Bibliography: cisco.com, 2021. Cisco 1900 Series Integrated Services Routers. [online] www.cisco.com. Available at: <https://www.cisco.com/c/en/us/support/routers/1900-series-integrated-services-routers-isr/series.html> [Accessed 6 May 2022].

  • Website

    cisco.com

    CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.6 - Access Control Lists [Cisco ASA 5500-X Series Firewalls]

    2021 - cisco.com

    In-text: (cisco.com, 2021)

    Your Bibliography: cisco.com, 2021. CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.6 - Access Control Lists [Cisco ASA 5500-X Series Firewalls]. [online] cisco.com. Available at: <https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config/access-acls.html> [Accessed 4 May 2022].

  • Website

    Cox, J.

    Access Control List (ACL) - What are They and How to Configure Them! • ITT Systems

    2020 - ittsystems.com

    In-text: (Cox, 2020)

    Your Bibliography: Cox, J., 2020. Access Control List (ACL) - What are They and How to Configure Them! • ITT Systems. [online] ITT Systems. Available at: <https://www.ittsystems.com/access-control-list-acl/#wbounce-modal> [Accessed 4 May 2022].

  • Website

    Ellingwood, J.

    SSH Essentials: Working with SSH Servers, Clients, and Keys | DigitalOcean

    2020 - Justin Ellingwood

    In-text: (Ellingwood, 2020)

    Your Bibliography: Ellingwood, J., 2020. SSH Essentials: Working with SSH Servers, Clients, and Keys | DigitalOcean. [online] www.Digitalocean.com. Available at: <https://www.digitalocean.com/community/tutorials/ssh-essentials-working-with-ssh-servers-clients-and-keys> [Accessed 8 May 2020].

  • Website

    February, A.

    Cisco Learning Network

    2020 - Admin February

    In-text: (February, 2020)

    Your Bibliography: February, A., 2020. Cisco Learning Network. [online] Learningnetwork.cisco.com. Available at: <https://learningnetwork.cisco.com/s/question/0D53i00000Kt1jrCAB/pvst-how-does-it-really-work> [Accessed 4 May 2022].

  • Website

    fortinet.com

    What is ICMP (Internet Control Message Protocol)? | Fortinet

    2022 - fortinet.com

    In-text: (fortinet.com, 2022)

    Your Bibliography: fortinet.com, 2022. What is ICMP (Internet Control Message Protocol)? | Fortinet. [online] fortinet.com. Available at: <https://www.fortinet.com/resources/cyberglossary/internet-control-message-protocol-icmp> [Accessed 6 May 2022].

  • Website

    Goodman, R.

    5 ways physical security breaches can threaten your network - IT Governance USA Blog

    2016 - Ralph Goodman

    In-text: (Goodman, 2016)

    Your Bibliography: Goodman, R., 2016. 5 ways physical security breaches can threaten your network - IT Governance USA Blog. [online] IT Governance USA Blog. Available at: <https://www.itgovernanceusa.com/blog/5-ways-physical-security-breaches-can-threaten-your-network> [Accessed 21 May 2022].

  • Website

    Homann, M.

    6 Must-Have Policies for Every Company

    2022 - Moritz Homann

    In-text: (Homann, 2022)

    Your Bibliography: Homann, M., 2022. 6 Must-Have Policies for Every Company. [online] EQS Group. Available at: <https://www.eqs.com/en-gb/compliance-knowledge/blog/must-have-policies-company/#:~:text=Internal%20company%20policies%20define%20how,and%20also%20on%20the%20industry.> [Accessed 5 May 2022].

  • Website

    Jaludi, M.

    What is SSH?

    2020 - Medium

    In-text: (Jaludi, 2020)

    Your Bibliography: Jaludi, M., 2020. What is SSH?. [online] LevelUpCoding.com. Available at: <https://levelup.gitconnected.com/what-is-ssh-103f89e3e4b8> [Accessed 5 May 2022].

  • Website

    O’Brien, K.

    Cyber & Physical Security: Why You Need Both

    2022 - Kelly O’Brien

    In-text: (O’Brien, 2022)

    Your Bibliography: O’Brien, K., 2022. Cyber & Physical Security: Why You Need Both. [online] Compassitc.com. Available at: <https://www.compassitc.com/blog/cyber-physical-security-why-you-need-both> [Accessed 8 May 2022].

  • Website

    omnisecu.com

    Cisco Three Layer / Three-tier Hierarchical Network Model

    2022 - omnisecu.com

    In-text: (omnisecu.com, 2022)

    Your Bibliography: omnisecu.com, 2022. Cisco Three Layer / Three-tier Hierarchical Network Model. [online] www.omnisecu.com. Available at: <https://www.omnisecu.com/cisco-certified-network-associate-ccna/three-tier-hierarchical-network-model.php> [Accessed 9 May 2022].

  • Website

    Openpath.com

    What is Physical Security? Measures & Planning Guide + PDF

    2022 - Openpath.com

    In-text: (Openpath.com, 2022)

    Your Bibliography: Openpath.com, 2022. What is Physical Security? Measures & Planning Guide + PDF. [online] www.openpath.com. Available at: <https://www.openpath.com/physical-security-guide> [Accessed 7 May 2022].

  • Website

    paloaltonetworks.com

    What Is a Site-to-Site VPN?

    2022 - Palo Alto Networks

    In-text: (paloaltonetworks.com, 2022)

    Your Bibliography: paloaltonetworks.com, 2022. What Is a Site-to-Site VPN?. [online] www.paloaltonetworks.com. Available at: <https://www.paloaltonetworks.com/cyberpedia/what-is-a-site-to-site-vpn> [Accessed 10 May 2022].

  • Website

    secureitstore.com

    Cisco Catalyst 3650 Stackable 24-Port Switch | SecureITStore.com

    2020 - secureitstore.com

    In-text: (secureitstore.com, 2020)

    Your Bibliography: secureitstore.com, 2020. Cisco Catalyst 3650 Stackable 24-Port Switch | SecureITStore.com. [online] Secureitstore.com. Available at: <https://www.secureitstore.com/C3650-24-L.asp> [Accessed 6 May 2022].

  • Website

    speaknetworks.com

    Enable ICMP inspection to Allow Ping Traffic Passing ASA

    2022 - speaknetworks.com

    In-text: (speaknetworks.com, 2022)

    Your Bibliography: speaknetworks.com, 2022. Enable ICMP inspection to Allow Ping Traffic Passing ASA. [online] www.speaknetworks.com. Available at: <https://www.speaknetworks.com/enable-icmp-inspection-to-allow-ping-traffic-passing-asa/> [Accessed 6 May 2022].

  • Website

    Techopedia.com

    What is Site-to-Site VPN? - Definition from Techopedia

    2021 - Techopedia

    In-text: (Techopedia.com, 2021)

    Your Bibliography: Techopedia.com, 2021. What is Site-to-Site VPN? - Definition from Techopedia. [online] Techopedia.com. Available at: <https://www.techopedia.com/definition/30747/site-to-site-vpn> [Accessed 3 May 2022].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join