Bibliography

  1. International Business. pimg.tradeindia.com/01048910/b/1/Online-Business-Consulting-Support-Services.jpg.
  2. 3.2 Billion People Now Using Internet Worldwide | Money. Time, Time, time.com/money/3896219/internet-users-worldwide/.
  3. "Boutell.Com." WWW FAQs: Where is the information on the Internet stored?, www.boutell.com/newfaq/misc/wherethedatais.html.
  4. "Sorry - javatpoint." Www.javatpoint.com, www.javatpoint.com/servletpages/servletterminology.
  5. "Security in the Data Center." SAP Data Center, www.sapdatacenter.com/article/data_center_security/.
  6. Escober, Rovic. "A way to be safe online is to never post any private or p... by Rovic Escober." ThingLink, www.thinglink.com/scene/891043297290616833.
  7. "DCIM simplifies managing service windows in the data center." Nlyte, 9 Jan. 2018, www.nlyte.com/blog/dcim-strategy/dcim-simplifies-managing-service-windows-in-the-data-center/.
  8. Government of Canada, Royal Canadian Mounted Police, Federal and International Operations, Commercial Crime Branch. "Identity Theft and Identity Fraud." Identity Theft and Identity Fraud - Royal Canadian Mounted Police, 4 Dec. 2015, www.rcmp-grc.gc.ca/scams-fraudes/id-theft-vol-eng.htm.
  9. "10 Reasons Why You Should Start Avoiding Strangers On Facebook." Born Realist, 21 Sept. 2017, bornrealist.com/10-reasons-start-avoiding-strangers-facebook/.
  10. wikiHow. "How to Prevent Hacking." WikiHow, WikiHow, 7 Feb. 2018, www.wikihow.com/Prevent-Hacking.
  11. SuperStock. "Businesswoman feeding personal information on computer." Getty Images, www.gettyimages.ca/detail/illustration/businesswoman-feeding-personal-information-on-computer-stock-graphic/107798132.
  12. "What is phishing? - Definition from WhatIs.Com." SearchSecurity, searchsecurity.techtarget.com/definition/phishing.
  13. "Security Tip (ST04-005)." Understanding Anti-Virus Software, www.us-cert.gov/ncas/tips/ST04-005.
  14. "What Is Network Security?" Cisco, 7 Feb. 2018, www.cisco.com/c/en/us/products/security/what-is-network-security.html.
  15. "What is proxy firewall? - Definition from WhatIs.Com." SearchSecurity, searchsecurity.techtarget.com/definition/proxy-firewall.
  16. "What is intrusion prevention? - Definition from WhatIs.Com." SearchSecurity, searchsecurity.techtarget.com/definition/intrusion-prevention.
  17. "3 dirty tricks that antivirus companies don't want you to know about." Softonic, Http://En.softonic.com/, 30 May 2016, en.softonic.com/articles/3-dirty-tricks-that-antivirus-companies-dont-want-you-to-know-about.
  18. Jack, Posted by. "What Is a Firewall?" What is a Firewall? - TunnelsUP, www.tunnelsup.com/what-is-a-firewall/.
  19. IntelliSecurity™ - Intrusion Protection Service - NTT America, us.ntt.net/products/intellisecurity/intrusion-protection-services.cfm.
  20. "Strong Password Guidelines." Strong Password Guidelines - Media Temple, mediatemple.net/community/products/dv/204644370/strong-password-guidelines.
  21. Chaikivsky, Andrew. "Everything You Need to Know About Password Managers." Consumer Reports, www.consumerreports.org/digital-security/everything-you-need-to-know-about-password-managers/.
  22. Lancet, Yaara. "Review: Dashlane is a robust password manager with a gorgeous interface." PCWorld, PCWorld, 10 July 2013, www.pcworld.com/article/2043301/review-dashlane-is-a-robust-password-manager-with-a-gorgeous-interface.html.