These are the sources and citations used to research MGMT 394 Annotated Bibliography. This bibliography was generated on Cite This For Me on
In-text: (CIS, 2021)
Your Bibliography: CIS, 2021. The SolarWinds Cyber-Attack: What You Need to Know. [online] CIS. Available at: <https://www.cisecurity.org/solarwinds> [Accessed 27 March 2022].
In-text: (Cook, 2021)
Your Bibliography: Cook, T., 2021. Analysis of the SolarWinds Supply Chain Attack. [online] Guidepointsecurity.com. Available at: <https://www.guidepointsecurity.com/blog/analysis-of-the-solarwinds-supply-chain-attack/> [Accessed 27 March 2022].
In-text: (Fireeye, 2020)
Your Bibliography: Fireeye, 2020. Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor | Mandiant. [online] Mandiant.com. Available at: <https://www.mandiant.com/resources/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor> [Accessed 27 March 2022].
In-text: (Fireeye, 2022)
Your Bibliography: Fireeye, 2022. Anatomy of an APT (Advanced Persistent Threat) Attack | FireEye. [online] FireEye. Available at: <https://www.fireeye.com/current-threats/anatomy-of-a-cyber-attack.html> [Accessed 27 March 2022].
In-text: (Herr et al., 2021)
Your Bibliography: Herr, T., Loomis, W., Schroeder, E., Stewart, S., Handler, S. and Zuo, T., 2021. Broken trust: Lessons from Sunburst. [online] Atlantic Council. Available at: <https://www.atlanticcouncil.org/in-depth-research-reports/report/broken-trust-lessons-from-sunburst/> [Accessed 27 March 2022].
In-text: (Imperva, 2022)
Your Bibliography: Imperva, 2022. What is APT (Advanced Persistent Threat) | APT Security | Imperva. [online] Learning Center. Available at: <https://www.imperva.com/learn/application-security/apt-advanced-persistent-threat/> [Accessed 27 March 2022].
In-text: (Quintero-Bonilla and Martín del Rey, 2020)
Your Bibliography: Quintero-Bonilla, S. and Martín del Rey, A., 2020. A New Proposal on the Advanced Persistent Threat: A Survey. [online] MDPI Open Access Journals. Available at: <https://www.mdpi.com/2076-3417/10/11/3874/html> [Accessed 27 March 2022].
In-text: (Rosencrance, 2022)
Your Bibliography: Rosencrance, L., 2022. What is advanced persistent threat (APT)? Definition from SearchSecurity. [online] SearchSecurity. Available at: <https://www.techtarget.com/searchsecurity/definition/advanced-persistent-threat-APT> [Accessed 27 March 2022].
In-text: (Virsec Systems, 2022)
Your Bibliography: Virsec Systems, 2022. Analysis of the SolarWinds Attack. [online] Youtube.com. Available at: <https://www.youtube.com/watch?v=8O8v022f06g> [Accessed 27 March 2022].
In-text: (Zynda, 2020)
Your Bibliography: Zynda, Z., 2020. The FBI v Apple. [online] Linkedin.com. Available at: <https://www.linkedin.com/pulse/fbi-v-apple-zachary-zynda> [Accessed 3 April 2022].
10,587 students joined last month!