References

 

“Guide to Keeping Your Media Accounts Secure” , 2015, http://www.defense.gov/documents/WEB_Guide_to_Keeping_Your_Social_Media_Accounts_Secure_2015.pdf, Accessed 15 July 2015.

“Social Networks”, 2015, https://www.staysafeonline.org/stay-safe-online/protect-your-personal-information/social-networks, Accessed 15 July 2015

American Civil Liberties Union (ACLU) and ACLU Foundation (2015). Surveillance Under the USA PATRIOT Act. (2015). Retrieved July 3, 2015, from https://www.aclu.org/surveillance-under-usa-patriot-act

Associates, C. O. (2007, September 13). Types of Phishing Attacks. Retrieved November 20, 2017, from https://www.pcworld.com/article/135293/article.htm

Bailey, M. (2015, January 5). wombatsecurity.com. Retrieved April 20, 2015, from wombatsecurity: http://info.wombatsecurity.com/blog/the-latest-in-phishing-attacks-first-of-2015

Beal, V. (n.d.). Webopedia. Retrieved July 9, 2015, from Webopedia.com: http://www.webopedia.com/TERM/S/spam.html

Beal, V. (n.d.). Webopedia. Retrieved June 28, 2015, from webopedia.com: http://www.webopedia.com/TERM/F/firewall.html

Beal, V. (n.d.). What is a Trojan horse? Retrieved July from http://www.webopedia.com/TERM/T/Trojan_horse.html

Berr, J. (2017, May 16). "WannaCry" ransomware attack losses could reach $4 billion. Retrieved November 11, 2018, from https://www.cbsnews.com/news/wannacry-ransomware-attacks-wannacry-virus-losses/

Branigin, S. (2018) Senior Helpdesk Technician, Wayne UNC. Footprint service ticket.

Computer Hope. (n.d.). Retrieved July 17, 2015, from Computer Hope.com: http://www.computerhope.com/jargon/s/spam.htm

Current and future trends in remote work. Business News Daily. (n.d.). Retrieved April 10, 2023, from https://www.businessnewsdaily.com/8156-future-of-remote-work.html

Cyber-attack: Europol says it was unprecedented in scale. (2017, May 13). Retrieved November 10, 2018, from https://www.bbc.com/news/world-europe-39907965

Damouni, J. F. (2014, August 21). Reuters.com. Retrieved from Reuters: http://www.reuters.com/article/2014/08/21/us-cybercrime-jpmorgan-spam-idUSKBN0GL20R20140821

Davis, J. (2018, January 26). Allscripts sued over ransomware attack, accused of 'wanton' disregard. Retrieved January 27, 2018, from http://www.healthcareitnews.com/news/allscripts-sued-over-ransomware-attack-accused-wanton-disregard

Dean franklin explains why software updates are important. (2022, Nov 03). The Boorowa News Retrieved from https://proxy.umo.edu/login?url=https://www.proquest.com/newspapers/dean-franklin-explains-why-software-updates-are/docview/2731150622/se-2

Diamond, J. (2015, June 1). Patriot Act provisions have expired: What happens now? – CNNPolitics.com. Retrieved July 4, 2015, from http://www.cnn.com/2015/05/30/politics/ what-happens-if-the-patriot-act-provisions-expire/

Digital in 2017: Global Overview. (2017, January 24). Retrieved November 03, 2017, from https://wearesocial.com/us/special-reports/digital-in-2017-global-overview

Dr. Kirda, E. (n.d.). Blackhat - White Pages [Brochure]. Author. Retrieved January 25, 2018, from https://www.blackhat.com/docs/us-15/materials/us-15-Kirda-Most-Ransomware-Isn%E2%80%99t-As-Complex-As-You-Might-Think-wp.pdf

Dulaney, E. (2015). CompTIA Security+ Study Guide (5th Ed.). Indianapolis, IN: Wiley Publishing, Inc.

Easttom, C. (2016). Computer Security Fundamentals (3rd Ed.). Place of publication not identified: Pearson It Certification.

Easttom, C. (2020). Computer Security Fundamentals. 4th ed. Pearson Education, Inc.

Ellis, D. (n.d.). Top 10 Types of Phishing Emails. Retrieved November 20, 2017, from http://blog.securitymetrics.com/2014/05/types-of-phishing-emails.html

FBI. (2009, October 7). The FBI. Retrieved from THE FBI.GOV: http://www.fbi.gov/news/stories/2009/october/phishphry_100709

Google. (2015a). The site's security certificate is not trusted!. Retrieved from https://support.google.com/chrome/answer/98884?hl=en

Google. (2015b). Set up your device for automatic unlock. Retrieved from https://support.google.com/nexus/answer/6093922?hl=en

Greenberg, A. (2018, October 24). The Untold Story of NotPetya, the Most Devastating Cyberattack in History. Retrieved November 11, 2018, from https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/

Heimerl, J. L. (2012, October 20). Security Week. Retrieved from Securityweek.com: http://www.securityweek.com/why-phishing-works-and-how-avoid-becoming-victim

History.com Staff (2009). George W. Bush signs the Patriot Act. Retrieved July 3, 2015, from http://www.history.com/this-day-in-history/george-w-bush-signs-the-patriot-act

Hong, J. (2012, January). Communications ACM. Retrieved from cacm.acm.org: http://cacm.acm.org/magazines/2012/1/144811-the-state-of-phishing-attacks/fulltext

How to Recognize Phishing Email Messages, Links, or Phone Calls. (n.d.). Retrieved November 20, 2017, from https://www.microsoft.com/en-us/safety/online-privacy/phishing-symptoms.aspx

How to Spot Fake News. (2016, December 19). Retrieved November 04, 2017, from http://www.factcheck.org/2016/11/how-to-spot-fake-news/

             https://www.vmware.com/topics/glossary/content/mobile-device-security.html

Hunter, T. (2022, September 26). You probably don’t need to worry about public WiFi anymore. Retrieved from The Washington Post: https://www.washingtonpost.com/technology/2022/09/26/public-wifi-privacy/

Inc., H. M. (2017, January 24). New Research Reveals Global Social Media Use Increased by 21 Percent in 2016 - Social Media Marketing & Management Dashboard. Retrieved November 03, 2017, from https://hootsuite.com/newsroom/press-releases/digital-in-2017-report

INFOSEC Institute. (2012, December 2012). resources.infosecinstitute. Retrieved from resources.infosecinstitute.com: http://resources.infosecinstitute.com/phishing-dangerous-cyber-threat/

InfoTECH. (2010, October 12). The importance of windows updates. Retrieved from http://www.infotech.us/company-blog/8-the-importance-of-windows-updates

Jen Easterly, More Than A Password, https://www.cisa.gov/MFA

Kaspersky Lab. (n.d.). What is a keylogger? Retrieved from https://usa.kaspersky.com/internet-security-center/definitions/keylogger#.VahUsRNViko

Kaspersky. (2021, March 30). Cyber security risks: Best practices for working from home and remotely. usa.kaspersky.com. Retrieved April 10, 2023, from https://usa.kaspersky.com/resource-center/threats/remote-working-how-to-stay-safe

Madelyn Bacon, What Is A Password, https://www.techtarget.com/searchsecurity/definition/password

McCormack, P. (2023, March 22). Why physical security matters for your cybersecurity efforts: Spark Blog: ADP. SPARK. Retrieved April 3, 2023, from https://www.adp.com/spark/articles/2017/10/why-physical-security-matters-for-your-cybersecurity-efforts.aspx

McCoy, K. (2022, July 5). Public WiFi not always convenient — and could be dangerous. Retrieved from The University of Alabama at Birmingham: https://www.uab.edu/it/news/item/public-wifi-not-always-convenient-and-could-be-dangerous

Nelson, Brooke. (2023). Top Security Threats of Smartphones (2022). Reader's Digest. Retrieved March 24, 2023 from https://www.rd.com/article/mobile-security-threats/

O'Connor, F. (2016). Cybereason Black Hat Live: Preventing unknown ransomware attacks. Retrieved January 27, 2018, from https://www.cybereason.com/blog/cybereason-black-hat-live-preventing-unknown-ransomware-attacks

Palmer, D. (2018, May 11). WannaCry ransomware crisis, one year on: Are we ready for the next global cyber attack? Retrieved November 11, 2018, from https://www.zdnet.com/article/wannacry-ransomware-crisis-one-year-on-are-we-ready-for-the-next-global-cyber-attack/

Passcodes.org. (n.d.). Password Attack Methods And Prevention. Retrieved from http://passcodes.org/security/password-attack-methods-and-prevention/

PASSWORD MANAGERS. (2022, 01). MacFormat, , 86-91. Retrieved from https://proxy.umo.edu/login?url=https://www.proquest.com/magazines/password-managers/docview/2611918722/se-2

Pelgrin, William F., “Securing Social Media Accounts” April 2014 http://iic.cisecurity.org/resources/documents/CISPrimer-SecuringSocialMediaAccounts.pdf, Accessed 15 July 2015

Perlroth, N., & Sanger, D. E. (2017, May 12). Hackers Hit Dozens of Countries Exploiting Stolen N.S.A. Tool. Retrieved November 11, 2018, from https://www.nytimes.com/2017/05/12/world/europe/uk-national-health-service-cyberattack.html

Rashid, F. Y. (2017, October 27). Types of phishing attacks and how to identify them. Retrieved November 20, 2017, from https://www.csoonline.com/article/3234716/phishing/types-of-phishing-attacks-and-how-to-identify-them.html

Rashid, Fahmida Y. “8 Types of Phishing Attacks and How to Identify Them.” CSO Online, CSO, 24 Nov. 2020, https://www.csoonline.com/article/3234716/8-types-of-phishing-attacks-and-how-to-identify-them.html.

RF Wireless World. Advantages of Cloud security | disadvantages of Cloud security. (n.d.). Retrieved April 4, 2023, from https://www.rfwireless-world.com/Terminology/Advantages-and-Disadvantages-of-Cloud-Security.html#:~:text=Following%20are%20the%20benefits%20or,personnel%20from%20cloud%20provider%20side.

Rouse, M. (2015). What is man-in-the-middle attack (MitM)? Retrieved from http://searchsecurity.techtarget.com/definition/man-in-the-middle-attack

Science and Technology: Mobile Device Security. U.S. Department of Homeland Security. (n.d.) Retrieved from https://www.dhs.gov/science-and-technology/mobile-device-security

Security, Microsoft. “What Is Phishing?: Microsoft Security.” What Is Phishing? | Microsoft Security, Microsoft, 2012, https://www.microsoft.com/en-us/security/business/security-101/what-is phishing?ef_id=_k_4d16a0494ea612dbc4d1c47d0379a523_k_&OCID=AIDcmmdamuj0pc_SEM_k_4d16a0494ea612dbc4d1c47d0379a523_k_&msclkid=4d16a0494ea612dbc4d1c47d0379a523.

Shi, R., Zhou, Y., Li, Y., & Han, W. (2021). Understanding offline password-cracking methods: A large-scale empirical study. Security and Communication Networks, 2021 doi:https://doi.org/10.1155/2021/5563884

Singh, J. (2019). Risks and Prevention Measures of Removable Media. International Journal of Computer Applications, 182(3), 1-4. doi: 10.5120/ijca2019918828

Singh, R. (2022, August 3). What is cloud security and what are the benefits?: Indusface Blog. Indusface. Retrieved April 4, 2023, from https://www.indusface.com/blog/what-is-cloud-security-and-what-are-the-benefits/

Smart Lock.(2017). Google Smart Lock: Security Amplified. Retrieved November 9, 2017, from https://get.google.com/smartlock/

Smith, R. (2018). Triangle doctor: Allscripts ransomware attack cost his practice dollars, hurt patients, shows danger of electronic records. Retrieved January 27, 2018, from http://www.wraltechwire.com/2018/01/26/triangle-doctor-allscripts-ransomware-attack-cost-his-practice-dollars-hurt-patients-shows-danger-of-electronic-records/

Spitzer, J. (2018). How the Allscripts ransomware attack hurt one Ohio physician's practice. Retrieved January 27, 2018, from http://www.beckershospitalreview.com/cybersecurity/how-the-allscripts-ransomware-attack-hurt-one-ohio-physician-s-practice.html

Terrell, Emily E. "Introduction To Module V: The USA PATRIOT ACT, Foreign Intelligence Surveillance and Cyberspace Privacy." Privacy in Cyberspace. Harvard Law School, n.d.

The National Institute of Standards and Technology (2016). Guidelines for Media Sanitization. Special Publication 800-88 Revision 1. Retrieved from https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf

Top 20 Facebook Statistics - Updated November 2017. (2017, November 1). Retrieved November 03, 2017, from https://zephoria.com/top-15-valuable-facebook-statistics/

Top 7 Mobile Security Threats. Kaspersky. (n.d.). Retrieved March 24, 2023 fromhttps://usa.kaspersky.com/resource-center/threats/

University of Texas EDU. (2010, October 5). Retrieved July 17, 2015, from utexas.edu: http://www.utexas.edu/its/secure/articles/firewalls.php

Vedova, H., & Technology, T. F. T. C. O. of. (2021, November 9). Physical security. Federal Trade Commission. Retrieved April 3, 2023, from https://www.ftc.gov/business-guidance/small-businesses/cybersecurity/physical-security

Vinjamuri, David, “Ethics and the 5 Deadly Sins of Social Media”. 4 Nov. 2011, http://www.forbes.com/sites/davidvinjamuri/2011/11/03/ethics-and-the-5-deadly-sins-of-social-media/, Accessed 15 July 2015

Wallen, J. (2015, June 21). Get serious about Android anti-theft with Cerberus. Retrieved from http://news.yahoo.com/serious-android-anti-theft-cerberus-030502000.html

What is cloud security? cloud security defined. IBM. (n.d.). Retrieved April 4, 2023, from https://www.ibm.com/topics/cloud-security

What is Mobile Device Security?. VMware. (n.d.). Retrieved March 24, 2023 from

What is Mobile Security?. Proofpoint. (n.d.). Retrieved April 5, 2023 from https://www.proofpoint.com/us/threat-reference/mobile-security

Wi-Fi Alliance. (n.d.). Discover Wi-Fi security. Retrieved from http://www.wi-fi.org/discover-wi-fi/security

Wisegeek. (n.d.). Retrieved July 5, 2015, from Wisegeek.com: http://www.wisegeek.com/what-is-a-network-port.htm

Zamora, W. (2017). How to beat ransomware: prevent, don't react. Retrieved January 27, 2018, from https://blog.malwarebytes.com/101/2016/03/how-to-beat-ransomware-prevent-dont-react/

Checklist icons created by Freepik - Flaticon