These are the sources and citations used to research Conor Giffen-McCloskey. This bibliography was generated on Cite This For Me on

  • Website

    KEARY, T.

    Nessus vs OpenVAS: Which is Better? A Head-to-Head Comparison

    2022 - Comparitech

    In-text: (KEARY, 2022)

    Your Bibliography: KEARY, T., 2022. Nessus vs OpenVAS: Which is Better? A Head-to-Head Comparison. [online] Comparitech. Available at: <https://www.comparitech.com/net-admin/nessus-vs-openvas/#What_are_Vulnerability_Scanners>.

  • Website

    KUMAR, S. and FRAGKOS, D. G.

    Blogs

    2020 - digital14

    In-text: (KUMAR and FRAGKOS, 2020)

    Your Bibliography: KUMAR, S. and FRAGKOS, D., 2020. Blogs. [online] www.digital14.com. Available at: <https://www.digital14.com/insights/blogs/cyber-risk-management>.

  • Report

    National Institute of Standards and Technology | NIST

    Guide for Conducting Risk Assessments

    2012 - Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology | NIST

    In-text: (National Institute of Standards and Technology | NIST, 2012)

    Your Bibliography: National Institute of Standards and Technology | NIST, 2012. Guide for Conducting Risk Assessments. NIST Special Publication 800-30 Revision 1. [online] Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology | NIST. Available at: <https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-30r1.pdf>.

  • Website

    Reciprocity

    How You Should Rank Cybersecurity Vulnerabilities

    2022 - Reciprocity

    In-text: (Reciprocity, 2022)

    Your Bibliography: Reciprocity, 2022. How You Should Rank Cybersecurity Vulnerabilities. [online] Reciprocity. Available at: <https://reciprocity.com/blog/how-you-should-rank-cybersecurity-vulnerabilities/>.

  • Website

    SearchSecurity

    How to Perform a Cybersecurity Risk Assessment in 5 Steps

    2022 - techtarget

    In-text: (SearchSecurity, 2022)

    Your Bibliography: SearchSecurity, 2022. How to Perform a Cybersecurity Risk Assessment in 5 Steps. [online] SearchSecurity. Available at: <https://www.techtarget.com/searchsecurity/tip/How-to-perform-a-cybersecurity-risk-assessment-step-by-step>.

  • Website

    SecurityScorecard

    What is the CIA Triad? Definition and Examples

    2021 - SecurityScorecard

    In-text: (SecurityScorecard, 2021)

    Your Bibliography: SecurityScorecard, 2021. What is the CIA Triad? Definition and Examples. [online] SecurityScorecard. Available at: <https://securityscorecard.com/blog/what-is-the-cia-triad>.

  • Website

    SHEVCHENKO, N.

    Threat Modeling: 12 Available Methods

    2018 - SEI Blog

    In-text: (SHEVCHENKO, 2018)

    Your Bibliography: SHEVCHENKO, N., 2018. Threat Modeling: 12 Available Methods. [online] SEI Blog. Available at: <https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/>.

  • Website

    Singh, H.

    How to perform a cyber security risk assessment? Step by step guide.

    2022 - thecyphere.com

    In-text: (Singh, 2022)

    Your Bibliography: Singh, H., 2022. How to perform a cyber security risk assessment? Step by step guide.. [online] thecyphere.com. Available at: <https://thecyphere.com/blog/cyber-security-risk-assessment/>.

  • Website

    Sotnikov, I.

    How to Perform IT Risk Assessment

    2022 - netwrix.com

    In-text: (Sotnikov, 2022)

    Your Bibliography: Sotnikov, I., 2022. How to Perform IT Risk Assessment. [online] Blog.netwrix.com. Available at: <https://blog.netwrix.com/2018/01/16/how-to-perform-it-risk-assessment/>.

  • Website

    Techopedia

    What is a Cyberthreat? - Definition from Techopedia

    2022 - Techopedia.com

    In-text: (Techopedia, 2022)

    Your Bibliography: Techopedia, 2022. What is a Cyberthreat? - Definition from Techopedia. [online] Techopedia.com. Available at: <https://www.techopedia.com/definition/25263/cyberthreat>.

  • Website

    TechTarget

    How to Perform a Cybersecurity Risk Assessment in 5 Steps

    2022 - techtarget.com

    In-text: (TechTarget, 2022)

    Your Bibliography: TechTarget, 2022. How to Perform a Cybersecurity Risk Assessment in 5 Steps. [online] techtarget.com. Available at: <https://www.techtarget.com/searchsecurity/tip/How-to-perform-a-cybersecurity-risk-assessment-step-by-step>.

  • Website

    Tyas Tunggal, A.

    How to Perform a Cyber Security Risk Assessment | UpGuard

    2022 - Upguard.com

    In-text: (Tyas Tunggal, 2022)

    Your Bibliography: Tyas Tunggal, A., 2022. How to Perform a Cyber Security Risk Assessment | UpGuard. [online] Upguard.com. Available at: <https://www.upguard.com/blog/cyber-security-risk-assessment>.

  • Website

    Vidalis, D. S.

    The Role of Deception in CND IO Dr

    2022 - School of Computing University of Glamorgan

    In-text: (Vidalis, 2022)

    Your Bibliography: Vidalis, D., 2022. The Role of Deception in CND IO Dr. [online] Slidetodoc.com. Available at: <https://slidetodoc.com/the-role-of-deception-in-cnd-io-dr/>.

  • Website

    WARD IT SECURITY

    Vulnerability Identification - WARD IT SECURITY

    2022 - WARD IT SECURITY

    In-text: (WARD IT SECURITY, 2022)

    Your Bibliography: WARD IT SECURITY, 2022. Vulnerability Identification - WARD IT SECURITY. [online] WARD IT SECURITY. Available at: <https://warditsecurity.com/vulnerability-identification/> [Accessed 2021].

  • Website

    ZHAO, J.

    How to Perform a Successful IT Risk Assessment - Hyperproof

    2022 - Hyperproof

    In-text: (ZHAO, 2022)

    Your Bibliography: ZHAO, J., 2022. How to Perform a Successful IT Risk Assessment - Hyperproof. [online] Hyperproof. Available at: <https://hyperproof.io/resource/it-risk-assessment/>.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join