Professional Documents
Culture Documents
Contents
Page
Acknowledgement 3
Unit 1 Introduction 4
2.1 Cyberthreat 7
2.2 Cybersecurity 7
5.3.6 Takeaways 24
6. Findings 26
7. Recommendations 27
8. Conclusion 29
9. References 31
Restricted
Restricted
Reference
1. http://www.computerworld.com/storyba/0,4125,NAV47_STO66665,00.html.
2. http://www.computerworld.com/storyba/0,4125,NAV47_STO66665,00.html.
3. http://www.computerworld.com/news/1999/story/0,11280,27617,00.html
4. https://www.knowitallninja.com/lessons/the-impact-of-threats/
5. https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-
trends/enisa-threat-landscape/
6. https://www.thegfce.com/initiatives/r/responsible-disclosure-initiat iveethical-
hacking/
7. https://www.techtarget.com/searchsecurity/feature/Top-10-types-of-information-
security-threats-for-IT-teams
8. https://www.symantec.com/security-center/threat-report.
9. https://documents.trendmicro.com/assets/rpt/rpt2017-midyear-security-roundup-
the-cost-of-compromise.pdf.
https://scsonline.georgetown.edu/programs/masters-technology-
management/resources/top-threats-to-information-technology
Restricted