Uploaded by sliita.sshiyanda

https

advertisement
Insightsforprofessionals.com (2020). 7 Types of Security Threat and How to Protect Against Them.
[ONLINE] Available at: https://www.insightsforprofessionals.com/it/security/types-of-security-threat.
[Last Accessed 20 December 2020].
Larry Bianculli (2020). 10 Common IT Security Risks in the Workplace. [ONLINE] Available at:
https://www.ccsinet.com/blog/common-security-risks-workplace/. [Last Accessed 20 December 2020].
Webroot.com (2020). Types of Computer Security Threats and How to Avoid Them. [ONLINE] Available
at: https://www.webroot.com/us/en/resources/tips-articles/computer-security-threats. [Last Accessed
20 December 2020].
Akamai.com (2020). What are the Security Risks of Cloud Computing?. [ONLINE] Available at:
https://www.akamai.com/us/en/resources/data-security-in-cloud-computing.jsp. [Last Accessed 21
December 2020].
Talend.com (2020). 8 Ways to Reduce Data Integrity Risk. [ONLINE] Available at:
https://www.talend.com/resources/reduce-data-integrity-risk/. [Last Accessed 22 December 2020].
Andrew Froehlich (2020). What are the risks of third-party VPN services?. [ONLINE] Available at:
https://searchnetworking.techtarget.com/answer/How-can-incorrectly-configuring-VPN-clients-lead-toa-security-breach. [Last Accessed 23 December 2020].
Valasecure.com (2020). 4 COMMON MISTAKES IN FIREWALL CONFIGURATION. [ONLINE] Available at:
https://www.valasecure.com/blog/4-common-mistakes-in-firewall-configuration. [Last Accessed 23
December 2020].
John Edwards (2020). Five Firewall Configuration Mistakes You Need to Avoid. [ONLINE] Available at:
https://www.networkcomputing.com/network-security/five-firewall-configuration-mistakes-you-needavoid?ng_gateway_return=true&full=true. [Last Accessed 23 December 2020].
Francis Dinha (2020). Why The Wrong VPN Is More Dangerous Than No VPN. [ONLINE] Available at:
https://www.forbes.com/sites/forbestechcouncil/2018/10/15/why-the-wrong-vpn-is-more-dangerousthan-no-vpn/?sh=14b5b36d2e5f. [Last Accessed 24 December 2020].
Jason Hiner (2020). Configuring VPN connections with firewalls. [ONLINE] Available at:
https://www.techrepublic.com/article/configuring-vpn-connections-with-firewalls/. [Last Accessed 24
December 2020].
Cisco.com (2020). What Is a Firewall?. [ONLINE] Available at:
https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html. [Last Accessed 26
December 2020].
Doubleoctopus.com (2020). DEMILITARIZED ZONE (DMZ). [ONLINE] Available at:
https://doubleoctopus.com/security-wiki/network-architecture/demilitarized-zone/. [Last Accessed 26
December 2020].
Manageengine.com (2020). What is Network Address Translation (NAT) ? . [ONLINE] Available at:
https://www.manageengine.com/network-configuration-manager/configlets/what-is-nat.html. [Last
Accessed 26 December 2020].
Whatismyipaddress.com (2020). What is Your IP Address Can Change without Notice. Should You Be
Concerned?. [ONLINE] Available at: https://whatismyipaddress.com/dynamic-static. [Last Accessed 26
December 2020].
Whitson Gordon (2020). How to Set Up a Static IP Address. [ONLINE] Available at:
https://www.pcmag.com/how-to/how-to-set-up-a-static-ip-address. [Last Accessed 26 December 2020].
Mycodecamp.com (2020). Network Address Translation | How NAT works | Advantages and
Disadvantages of NAT. [ONLINE] Available at: https://mycodecamp.blogspot.com/2020/07/networkaddress-translation-network.html. [Last Accessed 26 December 2020].
WIMPY (2020). What’s in a DMZ?. [ONLINE] Available at: https://simenteknindo.com/news/whats-in-admz/#. [Last Accessed 26 December 2020].
Mara Calvello (2020). What Is a Firewall? (How It Works + Why It’s Important). [ONLINE] Available at:
https://learn.g2.com/firewall. [Last Accessed 24 December 2020].
Sharmajitech.in (2020). vpn-diagram. [ONLINE] Available at: http://sharmajitech.in/virtual-privatenetworkvpn-use/vpn-diagram/. [Last Accessed 24 December 2020].
Netwrix.com (2020). Information Security Risk Assessment Checklist. [ONLINE] Available at:
https://www.netwrix.com/information_security_risk_assessment_checklist.html?var=b. [Last Accessed
22 December 2020].
Luminet (2020). Top 5 Benefits of Network Monitoring. [ONLINE] Available at: https://luminet.co.uk/top5-benefits-network-monitoring/. [Last Accessed 27 December 2020].
Sudha Aravindan (2020). Trusted Network: Solutions, Environment & Technologies. [ONLINE] Available
at: https://study.com/academy/lesson/trusted-network-solutions-environment-technologies.html. [Last
Accessed 27 December 2020].
Oracle.com (2011). The Trusted Network. [ONLINE] Available at:
https://docs.oracle.com/cd/E23824_01/html/821-1482/txnet-2.html. [Last Accessed 27 December
2020].
Slideteam.net (2020). Risk Management Module Powerpoint Presentation Slides. [ONLINE] Available at:
https://www.slideteam.net/risk-management-module-powerpoint-presentation-slides.html. [Last
Accessed 28 December 2020].
Manageengine.com (2020). Basics of Network Monitoring . [ONLINE] Available at:
https://www.manageengine.com/network-monitoring/basics-of-network-monitoring.html. [Last
Accessed 28 December 2020].
NICOLA COOTE (2020). 5 Steps to Risk Assessment Procedure. [ONLINE] Available at:
https://www.phsc.co.uk/5-steps-to-implement-a-risk-assessment-procedure/. [Last Accessed 28
December 2020].
Download