Insightsforprofessionals.com (2020). 7 Types of Security Threat and How to Protect Against Them. [ONLINE] Available at: https://www.insightsforprofessionals.com/it/security/types-of-security-threat. [Last Accessed 20 December 2020]. Larry Bianculli (2020). 10 Common IT Security Risks in the Workplace. [ONLINE] Available at: https://www.ccsinet.com/blog/common-security-risks-workplace/. [Last Accessed 20 December 2020]. Webroot.com (2020). Types of Computer Security Threats and How to Avoid Them. [ONLINE] Available at: https://www.webroot.com/us/en/resources/tips-articles/computer-security-threats. [Last Accessed 20 December 2020]. Akamai.com (2020). What are the Security Risks of Cloud Computing?. [ONLINE] Available at: https://www.akamai.com/us/en/resources/data-security-in-cloud-computing.jsp. [Last Accessed 21 December 2020]. Talend.com (2020). 8 Ways to Reduce Data Integrity Risk. [ONLINE] Available at: https://www.talend.com/resources/reduce-data-integrity-risk/. [Last Accessed 22 December 2020]. Andrew Froehlich (2020). What are the risks of third-party VPN services?. [ONLINE] Available at: https://searchnetworking.techtarget.com/answer/How-can-incorrectly-configuring-VPN-clients-lead-toa-security-breach. [Last Accessed 23 December 2020]. Valasecure.com (2020). 4 COMMON MISTAKES IN FIREWALL CONFIGURATION. [ONLINE] Available at: https://www.valasecure.com/blog/4-common-mistakes-in-firewall-configuration. [Last Accessed 23 December 2020]. John Edwards (2020). Five Firewall Configuration Mistakes You Need to Avoid. [ONLINE] Available at: https://www.networkcomputing.com/network-security/five-firewall-configuration-mistakes-you-needavoid?ng_gateway_return=true&full=true. [Last Accessed 23 December 2020]. Francis Dinha (2020). Why The Wrong VPN Is More Dangerous Than No VPN. [ONLINE] Available at: https://www.forbes.com/sites/forbestechcouncil/2018/10/15/why-the-wrong-vpn-is-more-dangerousthan-no-vpn/?sh=14b5b36d2e5f. [Last Accessed 24 December 2020]. Jason Hiner (2020). Configuring VPN connections with firewalls. [ONLINE] Available at: https://www.techrepublic.com/article/configuring-vpn-connections-with-firewalls/. [Last Accessed 24 December 2020]. Cisco.com (2020). What Is a Firewall?. [ONLINE] Available at: https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html. [Last Accessed 26 December 2020]. Doubleoctopus.com (2020). DEMILITARIZED ZONE (DMZ). [ONLINE] Available at: https://doubleoctopus.com/security-wiki/network-architecture/demilitarized-zone/. [Last Accessed 26 December 2020]. Manageengine.com (2020). What is Network Address Translation (NAT) ? . [ONLINE] Available at: https://www.manageengine.com/network-configuration-manager/configlets/what-is-nat.html. [Last Accessed 26 December 2020]. Whatismyipaddress.com (2020). What is Your IP Address Can Change without Notice. Should You Be Concerned?. [ONLINE] Available at: https://whatismyipaddress.com/dynamic-static. [Last Accessed 26 December 2020]. Whitson Gordon (2020). How to Set Up a Static IP Address. [ONLINE] Available at: https://www.pcmag.com/how-to/how-to-set-up-a-static-ip-address. [Last Accessed 26 December 2020]. Mycodecamp.com (2020). Network Address Translation | How NAT works | Advantages and Disadvantages of NAT. [ONLINE] Available at: https://mycodecamp.blogspot.com/2020/07/networkaddress-translation-network.html. [Last Accessed 26 December 2020]. WIMPY (2020). What’s in a DMZ?. [ONLINE] Available at: https://simenteknindo.com/news/whats-in-admz/#. [Last Accessed 26 December 2020]. Mara Calvello (2020). What Is a Firewall? (How It Works + Why It’s Important). [ONLINE] Available at: https://learn.g2.com/firewall. [Last Accessed 24 December 2020]. Sharmajitech.in (2020). vpn-diagram. [ONLINE] Available at: http://sharmajitech.in/virtual-privatenetworkvpn-use/vpn-diagram/. [Last Accessed 24 December 2020]. Netwrix.com (2020). Information Security Risk Assessment Checklist. [ONLINE] Available at: https://www.netwrix.com/information_security_risk_assessment_checklist.html?var=b. [Last Accessed 22 December 2020]. Luminet (2020). Top 5 Benefits of Network Monitoring. [ONLINE] Available at: https://luminet.co.uk/top5-benefits-network-monitoring/. [Last Accessed 27 December 2020]. Sudha Aravindan (2020). Trusted Network: Solutions, Environment & Technologies. [ONLINE] Available at: https://study.com/academy/lesson/trusted-network-solutions-environment-technologies.html. [Last Accessed 27 December 2020]. Oracle.com (2011). The Trusted Network. [ONLINE] Available at: https://docs.oracle.com/cd/E23824_01/html/821-1482/txnet-2.html. [Last Accessed 27 December 2020]. Slideteam.net (2020). Risk Management Module Powerpoint Presentation Slides. [ONLINE] Available at: https://www.slideteam.net/risk-management-module-powerpoint-presentation-slides.html. [Last Accessed 28 December 2020]. Manageengine.com (2020). Basics of Network Monitoring . [ONLINE] Available at: https://www.manageengine.com/network-monitoring/basics-of-network-monitoring.html. [Last Accessed 28 December 2020]. NICOLA COOTE (2020). 5 Steps to Risk Assessment Procedure. [ONLINE] Available at: https://www.phsc.co.uk/5-steps-to-implement-a-risk-assessment-procedure/. [Last Accessed 28 December 2020].