References
“Guide to Keeping Your
Media Accounts Secure” , 2015,
http://www.defense.gov/documents/WEB_Guide_to_Keeping_Your_Social_Media_Accounts_Secure_2015.pdf,
Accessed 15 July 2015.
“Social Networks”, 2015,
https://www.staysafeonline.org/stay-safe-online/protect-your-personal-information/social-networks,
Accessed 15 July 2015
American Civil Liberties
Union (ACLU) and ACLU Foundation (2015). Surveillance
Under the USA PATRIOT Act. (2015). Retrieved July 3,
2015, from
https://www.aclu.org/surveillance-under-usa-patriot-act
Associates, C. O. (2007,
September 13). Types of Phishing Attacks. Retrieved
November 20, 2017, from
https://www.pcworld.com/article/135293/article.htm
Bailey, M. (2015, January
5). wombatsecurity.com. Retrieved April 20, 2015, from
wombatsecurity:
http://info.wombatsecurity.com/blog/the-latest-in-phishing-attacks-first-of-2015
Beal, V. (n.d.). Webopedia.
Retrieved July 9, 2015, from Webopedia.com:
http://www.webopedia.com/TERM/S/spam.html
Beal, V. (n.d.). Webopedia.
Retrieved June 28, 2015, from webopedia.com:
http://www.webopedia.com/TERM/F/firewall.html
Beal, V. (n.d.). What is a
Trojan horse? Retrieved July from
http://www.webopedia.com/TERM/T/Trojan_horse.html
Berr, J. (2017, May 16).
"WannaCry" ransomware attack losses could reach $4
billion. Retrieved November 11, 2018, from
https://www.cbsnews.com/news/wannacry-ransomware-attacks-wannacry-virus-losses/
Branigin, S. (2018) Senior
Helpdesk Technician, Wayne UNC. Footprint service
ticket.
Computer Hope. (n.d.).
Retrieved July 17, 2015, from Computer Hope.com:
http://www.computerhope.com/jargon/s/spam.htm
Current and future trends
in remote work. Business News Daily. (n.d.). Retrieved
April 10, 2023, from
https://www.businessnewsdaily.com/8156-future-of-remote-work.html
Cyber-attack: Europol says
it was unprecedented in scale. (2017, May 13). Retrieved
November 10, 2018, from
https://www.bbc.com/news/world-europe-39907965
Damouni, J. F. (2014,
August 21). Reuters.com. Retrieved from Reuters:
http://www.reuters.com/article/2014/08/21/us-cybercrime-jpmorgan-spam-idUSKBN0GL20R20140821
Davis, J. (2018, January
26). Allscripts sued over ransomware attack, accused of
'wanton' disregard. Retrieved January 27, 2018, from
http://www.healthcareitnews.com/news/allscripts-sued-over-ransomware-attack-accused-wanton-disregard
Dean franklin explains why
software updates are important. (2022, Nov 03). The
Boorowa News Retrieved from
https://proxy.umo.edu/login?url=https://www.proquest.com/newspapers/dean-franklin-explains-why-software-updates-are/docview/2731150622/se-2
Diamond, J. (2015, June 1).
Patriot Act provisions have expired: What happens now? –
CNNPolitics.com. Retrieved July 4, 2015, from
http://www.cnn.com/2015/05/30/politics/
what-happens-if-the-patriot-act-provisions-expire/
Digital in 2017: Global
Overview. (2017, January 24). Retrieved November 03,
2017, from
https://wearesocial.com/us/special-reports/digital-in-2017-global-overview
Dr. Kirda, E. (n.d.).
Blackhat - White Pages [Brochure]. Author. Retrieved
January 25, 2018, from
https://www.blackhat.com/docs/us-15/materials/us-15-Kirda-Most-Ransomware-Isn%E2%80%99t-As-Complex-As-You-Might-Think-wp.pdf
Dulaney, E. (2015). CompTIA
Security+ Study Guide (5th Ed.). Indianapolis, IN: Wiley
Publishing, Inc.
Easttom, C. (2016).
Computer Security Fundamentals (3rd Ed.). Place of
publication not identified: Pearson It Certification.
Easttom, C. (2020).
Computer Security Fundamentals. 4th ed. Pearson
Education, Inc.
Ellis, D. (n.d.). Top 10
Types of Phishing Emails. Retrieved November 20, 2017,
from
http://blog.securitymetrics.com/2014/05/types-of-phishing-emails.html
FBI. (2009, October 7). The
FBI. Retrieved from THE FBI.GOV:
http://www.fbi.gov/news/stories/2009/october/phishphry_100709
Google. (2015a). The site's
security certificate is not trusted!. Retrieved from
https://support.google.com/chrome/answer/98884?hl=en
Google. (2015b). Set up
your device for automatic unlock. Retrieved from
https://support.google.com/nexus/answer/6093922?hl=en
Greenberg, A. (2018,
October 24). The Untold Story of NotPetya, the Most
Devastating Cyberattack in History. Retrieved November
11, 2018, from
https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/
Heimerl, J. L. (2012,
October 20). Security Week. Retrieved from
Securityweek.com:
http://www.securityweek.com/why-phishing-works-and-how-avoid-becoming-victim
History.com Staff (2009).
George W. Bush signs the Patriot Act. Retrieved July 3,
2015, from
http://www.history.com/this-day-in-history/george-w-bush-signs-the-patriot-act
Hong, J. (2012, January).
Communications ACM. Retrieved from cacm.acm.org:
http://cacm.acm.org/magazines/2012/1/144811-the-state-of-phishing-attacks/fulltext
How to Recognize Phishing
Email Messages, Links, or Phone Calls. (n.d.). Retrieved
November 20, 2017, from
https://www.microsoft.com/en-us/safety/online-privacy/phishing-symptoms.aspx
How to Spot Fake News.
(2016, December 19). Retrieved November 04, 2017, from
http://www.factcheck.org/2016/11/how-to-spot-fake-news/
https://www.vmware.com/topics/glossary/content/mobile-device-security.html
Hunter, T. (2022, September
26). You probably don’t need to worry about public WiFi
anymore. Retrieved from The Washington Post:
https://www.washingtonpost.com/technology/2022/09/26/public-wifi-privacy/
Inc., H. M. (2017, January
24). New Research Reveals Global Social Media Use
Increased by 21 Percent in 2016 - Social Media Marketing
& Management Dashboard. Retrieved November 03, 2017,
from
https://hootsuite.com/newsroom/press-releases/digital-in-2017-report
INFOSEC Institute. (2012,
December 2012). resources.infosecinstitute. Retrieved
from resources.infosecinstitute.com:
http://resources.infosecinstitute.com/phishing-dangerous-cyber-threat/
InfoTECH. (2010, October
12). The importance of windows updates. Retrieved from
http://www.infotech.us/company-blog/8-the-importance-of-windows-updates
Jen Easterly, More Than A
Password, https://www.cisa.gov/MFA
Kaspersky Lab. (n.d.). What
is a keylogger? Retrieved from
https://usa.kaspersky.com/internet-security-center/definitions/keylogger#.VahUsRNViko
Kaspersky. (2021, March
30). Cyber security risks: Best practices for working
from home and remotely. usa.kaspersky.com. Retrieved
April 10, 2023, from
https://usa.kaspersky.com/resource-center/threats/remote-working-how-to-stay-safe
Madelyn Bacon, What Is A
Password,
https://www.techtarget.com/searchsecurity/definition/password
McCormack, P. (2023, March
22). Why physical security matters for your
cybersecurity efforts: Spark Blog: ADP. SPARK. Retrieved
April 3, 2023, from
https://www.adp.com/spark/articles/2017/10/why-physical-security-matters-for-your-cybersecurity-efforts.aspx
McCoy, K. (2022, July 5).
Public WiFi not always convenient — and could be
dangerous. Retrieved from The University of Alabama at
Birmingham:
https://www.uab.edu/it/news/item/public-wifi-not-always-convenient-and-could-be-dangerous
Nelson, Brooke. (2023). Top
Security Threats of Smartphones (2022). Reader's Digest.
Retrieved March 24, 2023 from
https://www.rd.com/article/mobile-security-threats/
O'Connor, F. (2016).
Cybereason Black Hat Live: Preventing unknown ransomware
attacks. Retrieved January 27, 2018, from
https://www.cybereason.com/blog/cybereason-black-hat-live-preventing-unknown-ransomware-attacks
Palmer, D. (2018, May 11).
WannaCry ransomware crisis, one year on: Are we ready
for the next global cyber attack? Retrieved November 11,
2018, from
https://www.zdnet.com/article/wannacry-ransomware-crisis-one-year-on-are-we-ready-for-the-next-global-cyber-attack/
Passcodes.org. (n.d.).
Password Attack Methods And Prevention. Retrieved from
http://passcodes.org/security/password-attack-methods-and-prevention/
PASSWORD MANAGERS. (2022,
01). MacFormat, , 86-91. Retrieved from
https://proxy.umo.edu/login?url=https://www.proquest.com/magazines/password-managers/docview/2611918722/se-2
Pelgrin, William F.,
“Securing Social Media Accounts” April 2014
http://iic.cisecurity.org/resources/documents/CISPrimer-SecuringSocialMediaAccounts.pdf,
Accessed 15 July 2015
Perlroth, N., & Sanger, D.
E. (2017, May 12). Hackers Hit Dozens of Countries
Exploiting Stolen N.S.A. Tool. Retrieved November 11,
2018, from
https://www.nytimes.com/2017/05/12/world/europe/uk-national-health-service-cyberattack.html
Rashid, F. Y. (2017,
October 27). Types of phishing attacks and how to
identify them. Retrieved November 20, 2017, from
https://www.csoonline.com/article/3234716/phishing/types-of-phishing-attacks-and-how-to-identify-them.html
Rashid, Fahmida Y. “8 Types
of Phishing Attacks and How to Identify Them.” CSO
Online, CSO, 24 Nov. 2020,
https://www.csoonline.com/article/3234716/8-types-of-phishing-attacks-and-how-to-identify-them.html.
RF Wireless World.
Advantages of Cloud security | disadvantages of Cloud
security. (n.d.). Retrieved April 4, 2023, from
https://www.rfwireless-world.com/Terminology/Advantages-and-Disadvantages-of-Cloud-Security.html#:~:text=Following%20are%20the%20benefits%20or,personnel%20from%20cloud%20provider%20side.
Rouse, M. (2015). What is
man-in-the-middle attack (MitM)? Retrieved from
http://searchsecurity.techtarget.com/definition/man-in-the-middle-attack
Science and Technology:
Mobile Device Security. U.S. Department of Homeland
Security. (n.d.) Retrieved from
https://www.dhs.gov/science-and-technology/mobile-device-security
Security, Microsoft. “What
Is Phishing?: Microsoft Security.” What Is Phishing? |
Microsoft Security, Microsoft, 2012,
https://www.microsoft.com/en-us/security/business/security-101/what-is
phishing?ef_id=_k_4d16a0494ea612dbc4d1c47d0379a523_k_&OCID=AIDcmmdamuj0pc_SEM_k_4d16a0494ea612dbc4d1c47d0379a523_k_&msclkid=4d16a0494ea612dbc4d1c47d0379a523.
Shi, R., Zhou, Y., Li, Y.,
& Han, W. (2021). Understanding offline
password-cracking methods: A large-scale empirical
study. Security and Communication Networks, 2021
doi:https://doi.org/10.1155/2021/5563884
Singh, J. (2019). Risks and
Prevention Measures of Removable Media. International
Journal of Computer Applications, 182(3), 1-4. doi:
10.5120/ijca2019918828
Singh, R. (2022, August 3).
What is cloud security and what are the benefits?:
Indusface Blog. Indusface. Retrieved April 4, 2023, from
https://www.indusface.com/blog/what-is-cloud-security-and-what-are-the-benefits/
Smart Lock.(2017). Google
Smart Lock: Security Amplified. Retrieved November 9,
2017, from https://get.google.com/smartlock/
Smith, R. (2018). Triangle
doctor: Allscripts ransomware attack cost his practice
dollars, hurt patients, shows danger of electronic
records. Retrieved January 27, 2018, from
http://www.wraltechwire.com/2018/01/26/triangle-doctor-allscripts-ransomware-attack-cost-his-practice-dollars-hurt-patients-shows-danger-of-electronic-records/
Spitzer, J. (2018). How the
Allscripts ransomware attack hurt one Ohio physician's
practice. Retrieved January 27, 2018, from
http://www.beckershospitalreview.com/cybersecurity/how-the-allscripts-ransomware-attack-hurt-one-ohio-physician-s-practice.html
Terrell, Emily E.
"Introduction To Module V: The USA PATRIOT ACT, Foreign
Intelligence Surveillance and Cyberspace Privacy."
Privacy in Cyberspace. Harvard Law School, n.d.
The National Institute of
Standards and Technology (2016). Guidelines for Media
Sanitization. Special Publication 800-88 Revision 1.
Retrieved from
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf
Top 20 Facebook Statistics
- Updated November 2017. (2017, November 1). Retrieved
November 03, 2017, from
https://zephoria.com/top-15-valuable-facebook-statistics/
Top 7 Mobile Security
Threats. Kaspersky. (n.d.). Retrieved March 24, 2023
fromhttps://usa.kaspersky.com/resource-center/threats/
University of Texas EDU.
(2010, October 5). Retrieved July 17, 2015, from
utexas.edu:
http://www.utexas.edu/its/secure/articles/firewalls.php
Vedova, H., & Technology,
T. F. T. C. O. of. (2021, November 9). Physical
security. Federal Trade Commission. Retrieved April 3,
2023, from
https://www.ftc.gov/business-guidance/small-businesses/cybersecurity/physical-security
Vinjamuri, David, “Ethics
and the 5 Deadly Sins of Social Media”. 4 Nov. 2011,
http://www.forbes.com/sites/davidvinjamuri/2011/11/03/ethics-and-the-5-deadly-sins-of-social-media/,
Accessed 15 July 2015
Wallen, J. (2015, June 21).
Get serious about Android anti-theft with Cerberus.
Retrieved from
http://news.yahoo.com/serious-android-anti-theft-cerberus-030502000.html
What is cloud security?
cloud security defined. IBM. (n.d.). Retrieved April 4,
2023, from https://www.ibm.com/topics/cloud-security
What is Mobile Device
Security?. VMware. (n.d.). Retrieved March 24, 2023 from
What is Mobile Security?.
Proofpoint. (n.d.). Retrieved April 5, 2023 from
https://www.proofpoint.com/us/threat-reference/mobile-security
Wi-Fi Alliance. (n.d.).
Discover Wi-Fi security. Retrieved from
http://www.wi-fi.org/discover-wi-fi/security
Wisegeek. (n.d.). Retrieved
July 5, 2015, from Wisegeek.com:
http://www.wisegeek.com/what-is-a-network-port.htm
Zamora, W. (2017). How to
beat ransomware: prevent, don't react. Retrieved January
27, 2018, from
https://blog.malwarebytes.com/101/2016/03/how-to-beat-ransomware-prevent-dont-react/