These are the sources and citations used to research security. This bibliography was generated on Cite This For Me on
In-text: (Hashim, 2020)
Your Bibliography: Hashim, A., 2020. 6 times when hackers forced companies to go bankrupt and shut down. [online] PrivacySavvy. Available at: <https://privacysavvy.com/security/business/6-times-hackers-forced-companies-to-go-bankrupt-shut-down/> [Accessed 19 January 2022].
In-text: (Stosic, 2013)
Your Bibliography: Stosic, L., 2013. Computer security and security technologies. 1st ed. Journal of Process Management, pp.14-19.
In-text: (System, 2020)
Your Bibliography: System, E., 2020. 5 Real-Life Examples of Breaches Caused by Insider Threats. [online] Ekransystem.com. Available at: <https://www.ekransystem.com/en/blog/real-life-examples-insider-threat-caused-breaches> [Accessed 19 January 2022].
In-text: (What is Intrusion Prevention System? | VMware Glossary, 2022)
Your Bibliography: VMware. 2022. What is Intrusion Prevention System? | VMware Glossary. [online] Available at: <https://www.vmware.com/topics/glossary/content/intrusion-prevention-system.html> [Accessed 19 January 2022].
10,587 students joined last month!