Useful References And Resources
Bamrungchok, D. (n.d.). Digital Hygiene 101: How to practice digital safety and security. Retrieved 2 June, 2022, from https://coconet.social/digital-hygiene-safety-security/index.html
Brooks, R. (2020).How to Prevent Malware Attacks: 10 Security Tips. Retrieved 1 June 2022, from https://blog.netwrix.com/2020/06/12/malware-prevention/
Cipher. (n.d.). 10 Personal Cyber Security Tips — #CyberAware. Retrieved 1 June 2022, from https://cipher.com/blog/10-personal-cyber-security-tips-cyberware/
CIS. (Centre for Internet Security). (n.d.). Election Security Spotlight – Password Attacks. Retrieved 5 June 2022, from
Cisco. (2022). What is Malware? - Definition and Examples. Retrieved 28 September 2022, from https://www.cisco.com/c/en/us/products/security/advanced-malware-protection/what-is-malware.html#~related-topics
Commonwealth of Massachusetts. (n.d.). Know the types of cyber threats. Retrieved 5 May 2022, from https://www.mass.gov/service-details/know-the-types-of-cyber-threats
European Parliament. (2022). Cybersecurity: main and emerging threats in 2021 (infographic). Retrieved 15 May 2022, from
https://www.europarl.europa.eu/news/en/headlines/society/20220120STO21428/cybersecurity-main-and-emerging-threats-in-2021-infographic
FIREEYE. (n.d.). What is a Zero-Day Exploit? Zero-day exploit: an advanced cyber attack defined. Retrieved 15 May 2022, from
https://www.fireeye.com/current-threats/what-is-a-zero-day-exploit.html
Forcepoint. (n.d.). What is Threat Intelligence? Threat Intelligence Defined and Explored. Retrieved 29 May 2022, from https://www.forcepoint.com/cyber-edu/threat-intelligence
Forrester, N. (2021). A brief history of cyber-threats — from 2000 to 2020. Retrieved 17 May 2022, from https://securitybrief.co.nz/story/a-brief-history-of-cyber-threats-from-2000-to-2020
FRAUDWATCH. (n.d.). Cyber Security 101: The-basics of social media threats. Retrieved 28 May 2022, from https://fraudwatch.com/cyber-security-101-the-basics-of-social-media-threats/
Imperva. (n.d.). Cyber Security Solutions. Retrieved 17 May 2022, from https://www.imperva.com/learn/application-security/cyber-security-solutions/
Imperva. (n.d.). Man in the middle (MITM) attack. Retrieved 18 May 2022, from https://www.imperva.com/learn/application-security/man-in-the-middle-attack-mitm/
Imperva. (n.d.). Ransomware. Retrieved 11 May 2022, from https://www.imperva.com/learn/application-security/ransomware/#:~:text=Ransomware%20is%20a%20type%20of,unlock%20and%20decrypt%20the%20data
Imperva. (n.d.). Social Engineering. Retrieved 2 June 2022, from https://www.imperva.com/learn/application-security/social-engineering-attack/#:~:text=Social%20engineering%20is%20the%20term,or%20giving%20away%20sensitive%20information
Jithukrishnan. (2022). Top 10 password policies. Retrieved 3 June 2022, from https://www.securden.com/blog/top-10-password-policies.html
Karperksy. (n.d.). Emotet: How to best protect yourself from the Trojan. Retrieved 1 June 2022, from https://www.kaspersky.com/resource-center/threats/emotet
Kirsten, S. (n.d.). Cross Site Scripting (XSS), OWASP. Retrieved 25 May 2022, from https://owasp.org/www-community/attacks/xss/
Kost, E. (2022). What is Digital Risk? Definition and Protection Tactics for 2022. Retrieved 2 June 2022, from https://www.upguard.com/blog/digital-risk
Morgan, C. (2019). Cybersecurity CEO: The History Of Cybercrime, From 1834 To Present: Early hacking incidents were a glimpse of the future. Retrieved 24 May 2022, from https://cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/
Norton. (n.d.). 11 social media threats and scams to watch out for. Retrieved 16 May 2022, from https://uk.norton.com/internetsecurity-online-scams-11-social-media-threats-and-scams-to-watch-out-for.html
Paloalto Networks. (n.d.). What is a denial of service attack (DoS)?. Retrieved 17 May 2022, from https://www.paloaltonetworks.com/cyberpedia/what-is-a-denial-of-service-attack-dos#:~:text=A%20Denial%2Dof%2DService%20(,information%20that%20triggers%20a%20crash
Recorded Future. (n.d.). What Is Threat Intelligence?. Retrieved 5 May 2022, from https://www.recordedfuture.com/threat-intelligence
Techopedia. (2022). What is Likejacking? - Definition from Techopedia. Retrieved 28 September 2022, from https://www.techopedia.com/definition/27758/likejacking
TestMatick. (2018). THIRD-PARTY AUTHENTICATION. Retrieved 12 May 2022, from https://testmatick.com/third-party-authentication/#:~:text=Third%2Dparty%20authentication%20is%20based,by%20using%20their%20media%20accounts
UND (University of North Dakota). (n.d.). 7 Types of Cyber Security Threats. Retrieved 28 April 2022, from https://onlinedegrees.und.edu/blog/types-of-cyber-security-threats/
VMware. (n.d.). Remote Work Security. Retrieved 11 May 2022, from https://www.vmware.com/topics/glossary/content/remote-work-security.html
W3Schools. (n.d.). SQL Injection. Retrieved 18 May 2022, from https://www.w3schools.com/sql/sql_injection.asp