Introduction to Cyber Security



Yüklə 1,12 Mb.
səhifə71/72
tarix07.01.2024
ölçüsü1,12 Mb.
#210959
1   ...   64   65   66   67   68   69   70   71   72
Introduction-cyber-security

Networking in Windows 7. (s.j.). Onttrek Oct. 24, 2015 uit http://www.utilizewindows.com/: http://www.utilizewindows.com/7/networking/452-working-with-windows-firewall-in- windows-7 available under under a Creative Commons Attribution-NonCommercial- ShareAlike 4.0 International License.
NK, V. (2015, Jan. 24). A Peek into the Top Password Managers. Onttrek Oct. 24, 2015 uit opensourceforu.com: http://opensourceforu.efytimes.com/2015/01/peek-top-password- managers/ available under Creative Commons Attribution-NonCommercial 3.0 Unported License.
Nolan, R., O‟Sullivan, C., Branson, J., & Waits, C. (2005). First Responders guide to Computer Forensic. CERT Training and Education.
Password Authentication Protocol. (2015, July 17). Onttrek Sep. 26, 2015 uit WIKIPEDIA: https://en.wikipedia.org/wiki/Password_Authentication_Protocol available under the Creative Commons Attribution-ShareAlike License.
Press Information Bureau. (2006). India-US cyber security Forum - Fact Sheet.


PROTECT THE SENSITIVE FILES ON YOUR COMPUTER. (s.j.). Onttrek Oct. 29, 2015 uit
SECURITY IN-A-BOX: https://securityinabox.org/en/guide/secure-file-storage available under a Creative Commons Attribution-Share Alike 3.0 Unported License.
PROTECT YOURSELF AND YOUR DATA WHEN USING SOCIAL NETWORKING SITES.
(s.j.). Onttrek Oct. 29, 2015 uit securityinabox.org: https://securityinabox.org/en/guide/social- networking available under a Creative Commons Attribution-Share Alike 3.0 Unported License.
PTI. (2013). http://www.thehindu.com/news/national/govt-launches-crime-tracking-pilot- project/article4272857.ece. The Hindu.
Quirk, S. (2014, Mar. 13). Concordia Password Security Policy. Onttrek Sep. 26, 2015 uit http://kb.cu-portland.edu/Password+Security available under a Creative Commons Attribution
3.0 License.
Ranger, S. (2014, June 09). Organised cybercrime groups are now as powerful as nations. Onttrek Dec. 20, 2015 uit http://www.zdnet.com/organised-cybercrime-groups-are-now-as- powerful-as-nations-7000030323/
Recognise scam or hoax emails and websites. (s.j.). Onttrek Sep. 27, 2015 uit https://www.communications.gov.au: https://www.communications.gov.au/what-we- do/internet/stay-smart-online/your-identity/recognise-scam-or-hoax-emails-and-websites available under a Creative Commons Attribution 3.0 International License.
Rocha, L. (2012, Dec. 21). COMPUTER SECURITY INCIDENT HANDLING 6 STEPS.
Onttrek Dec. 20, 2015 uit Count Upon Security: http://countuponsecurity.com/2012/12/21/computer-security-incident-handling-6-steps/
Rusen, C. A. (2014, Sep. 09). How to start & use the Windows firewall with advance security. Onttrek Oct. 24, 2015 uit DigitalCitizen: http://www.digitalcitizen.life/gain-additional- control-using-windows-firewall-advanced-security available under Creative Commons Attribution-Noncommercial-Share Alike 4.0 International.
Rusen, C. A. (2014, Sep. 26). How to Start & Use The Windows Firewall with Advanced Security. Onttrek Oct. 29, 2015 uit http://www.digitalcitizen.lif: http://www.digitalcitizen.life/gain-additional-control-using-windows-firewall-advanced- security available under Creative Commons Attribution-Noncommercial-Share Alike 4.0 International.
Selecting a strong password. (2015, Sep. 10). Onttrek Sep. 26, 2015 uit Wordpress: https://en.support.wordpress.com/selecting-a-strong-password/ available under a Creative Commons Sharealike license.
Shubert, A. (2011). Cyber warfare: A different way to attack Iran's reactors. CNN.

Singh, G., Sharma, A., Rampal, K., Kular, R., Gupta, S., Sarita, R., et al. (2013). India Risk Survey 2013. Pinkerton and Federation of Indian Chambers of Commerce and Industry (FICCI).


Srinath, B. J. (2006). Cyber Security Awareness for Protection of National Information Infrastructure. Dept. of Information Technology. Ministry of Communication & Information Technology, Govt. if India.
Stewart, W. (2000, Jan. 07). How Email Works. Onttrek Sep. 28, 2015 uit http://www.livinginternet.com/: http://www.livinginternet.com/e/ew.htm available under a Creative Commons Attribution Share Alike License
Swain, B. (2009, July). What are malware, viruses, Spyware, and cookies, and what differentiates them ? Onttrek Dec. 20, 2015 uit http://www.symantec.com/connect/articles/what-are-malware-viruses-spyware-and-cookies- and-what-differentiates-them
Talukder, M. i. (s.j.). Free Antivirus. Onttrek Oct. 29, 2015 uit http://shaifulaueo.blogspot.in/p/free-antivirus_13.html available under a Creative Commons Attribution 3.0.license.

Yüklə 1,12 Mb.

Dostları ilə paylaş:
1   ...   64   65   66   67   68   69   70   71   72




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©www.azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin