These are the sources and citations used to research BSc-Network Sec.. This bibliography was generated on Cite This For Me on
In-text: (BBC, 2021)
Your Bibliography: BBC, 2021. Threats to networks - System security - OCR - GCSE Computer Science Revision - OCR - BBC Bitesize. [online] BBC Bitesize. Available at: <https://www.bbc.co.uk/bitesize/guides/zj89dxs/revision/2> [Accessed 8 May 2022].
In-text: (cisco.com, 2007)
Your Bibliography: cisco.com, 2007. IPSec Network Security Commands. [online] cisco.com. Available at: <https://www.cisco.com/c/en/us/td/docs/ios/12_2/security/command/reference/srfipsec.html> [Accessed 5 May 2022].
In-text: (cisco.com, 2017)
Your Bibliography: cisco.com, 2017. Cisco Catalyst 2960-X Series Switches. [online] www.cisco.com. Available at: <https://www.cisco.com/c/en/us/support/switches/catalyst-2960-x-series-switches/series.html> [Accessed 6 May 2022].
In-text: (cisco.com, 2018)
Your Bibliography: cisco.com, 2018. Cisco ASA 5505 Adaptive Security Appliance for Small Office or Branch Locations Data Sheet. [online] www.cisco.com. Available at: <https://www.cisco.com/c/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/datasheet-c78-733510.html> [Accessed 6 May 2022].
In-text: (cisco.com, 2018)
Your Bibliography: cisco.com, 2018. Security for VPNs with IPsec Configuration Guide, Cisco IOS XE Release 3S - Configuring Security for VPNs with IPsec [Support]. [online] cisco.com. Available at: <https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnips/configuration/xe-3s/sec-sec-for-vpns-w-ipsec-xe-3s-book/sec-cfg-vpn-ipsec.html> [Accessed 5 May 2022].
In-text: (cisco.com, 2021)
Your Bibliography: cisco.com, 2021. Cisco 1900 Series Integrated Services Routers. [online] www.cisco.com. Available at: <https://www.cisco.com/c/en/us/support/routers/1900-series-integrated-services-routers-isr/series.html> [Accessed 6 May 2022].
In-text: (cisco.com, 2021)
Your Bibliography: cisco.com, 2021. CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.6 - Access Control Lists [Cisco ASA 5500-X Series Firewalls]. [online] cisco.com. Available at: <https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config/access-acls.html> [Accessed 4 May 2022].
In-text: (Cox, 2020)
Your Bibliography: Cox, J., 2020. Access Control List (ACL) - What are They and How to Configure Them! • ITT Systems. [online] ITT Systems. Available at: <https://www.ittsystems.com/access-control-list-acl/#wbounce-modal> [Accessed 4 May 2022].
In-text: (Ellingwood, 2020)
Your Bibliography: Ellingwood, J., 2020. SSH Essentials: Working with SSH Servers, Clients, and Keys | DigitalOcean. [online] www.Digitalocean.com. Available at: <https://www.digitalocean.com/community/tutorials/ssh-essentials-working-with-ssh-servers-clients-and-keys> [Accessed 8 May 2020].
In-text: (February, 2020)
Your Bibliography: February, A., 2020. Cisco Learning Network. [online] Learningnetwork.cisco.com. Available at: <https://learningnetwork.cisco.com/s/question/0D53i00000Kt1jrCAB/pvst-how-does-it-really-work> [Accessed 4 May 2022].
In-text: (fortinet.com, 2022)
Your Bibliography: fortinet.com, 2022. What is ICMP (Internet Control Message Protocol)? | Fortinet. [online] fortinet.com. Available at: <https://www.fortinet.com/resources/cyberglossary/internet-control-message-protocol-icmp> [Accessed 6 May 2022].
In-text: (Goodman, 2016)
Your Bibliography: Goodman, R., 2016. 5 ways physical security breaches can threaten your network - IT Governance USA Blog. [online] IT Governance USA Blog. Available at: <https://www.itgovernanceusa.com/blog/5-ways-physical-security-breaches-can-threaten-your-network> [Accessed 21 May 2022].
In-text: (Homann, 2022)
Your Bibliography: Homann, M., 2022. 6 Must-Have Policies for Every Company. [online] EQS Group. Available at: <https://www.eqs.com/en-gb/compliance-knowledge/blog/must-have-policies-company/#:~:text=Internal%20company%20policies%20define%20how,and%20also%20on%20the%20industry.> [Accessed 5 May 2022].
In-text: (Jaludi, 2020)
Your Bibliography: Jaludi, M., 2020. What is SSH?. [online] LevelUpCoding.com. Available at: <https://levelup.gitconnected.com/what-is-ssh-103f89e3e4b8> [Accessed 5 May 2022].
In-text: (O’Brien, 2022)
Your Bibliography: O’Brien, K., 2022. Cyber & Physical Security: Why You Need Both. [online] Compassitc.com. Available at: <https://www.compassitc.com/blog/cyber-physical-security-why-you-need-both> [Accessed 8 May 2022].
In-text: (omnisecu.com, 2022)
Your Bibliography: omnisecu.com, 2022. Cisco Three Layer / Three-tier Hierarchical Network Model. [online] www.omnisecu.com. Available at: <https://www.omnisecu.com/cisco-certified-network-associate-ccna/three-tier-hierarchical-network-model.php> [Accessed 9 May 2022].
In-text: (Openpath.com, 2022)
Your Bibliography: Openpath.com, 2022. What is Physical Security? Measures & Planning Guide + PDF. [online] www.openpath.com. Available at: <https://www.openpath.com/physical-security-guide> [Accessed 7 May 2022].
In-text: (paloaltonetworks.com, 2022)
Your Bibliography: paloaltonetworks.com, 2022. What Is a Site-to-Site VPN?. [online] www.paloaltonetworks.com. Available at: <https://www.paloaltonetworks.com/cyberpedia/what-is-a-site-to-site-vpn> [Accessed 10 May 2022].
In-text: (secureitstore.com, 2020)
Your Bibliography: secureitstore.com, 2020. Cisco Catalyst 3650 Stackable 24-Port Switch | SecureITStore.com. [online] Secureitstore.com. Available at: <https://www.secureitstore.com/C3650-24-L.asp> [Accessed 6 May 2022].
In-text: (speaknetworks.com, 2022)
Your Bibliography: speaknetworks.com, 2022. Enable ICMP inspection to Allow Ping Traffic Passing ASA. [online] www.speaknetworks.com. Available at: <https://www.speaknetworks.com/enable-icmp-inspection-to-allow-ping-traffic-passing-asa/> [Accessed 6 May 2022].
In-text: (Techopedia.com, 2021)
Your Bibliography: Techopedia.com, 2021. What is Site-to-Site VPN? - Definition from Techopedia. [online] Techopedia.com. Available at: <https://www.techopedia.com/definition/30747/site-to-site-vpn> [Accessed 3 May 2022].
10,587 students joined last month!