References and Copyright

Submitted by Katie.Koukouli… on Tue, 11/14/2023 - 14:12
Sub Topics
  • Abdullahi, A. (2022, January 4). Malware vs viruses: What are the differences? CIO Insight. https://www.cioinsight.com/ security/malware-vs-virus/
  • Adobe. (n.d.). How to encrypt a PDF file for email. Retrieved September 8, 2022, from https://www.adobe.com/acrobat/ hub/how-to/how-to-encrypt-a-pdf-file-for-email
  • Akamai. (n.d.). Akamai internet station [Graphical Data]. Retrieved September 8, 2022, from https://www.akamai. com/internet-station
  • Android Help. (n.d.). Check & update your Android version. Retrieved September 8, 2022, from https://support.google. com/android/answer/7680439?hl=en
  • Any Difference Between. (n.d.). Difference between VPN and a firewall. Any Difference Between. Retrieved September 8, 2022, from https://anydifferencebetween.com/differencebetween-vpn-and-firewall/
  • Apple. (n.d.). Update iOS on iPhone. iPhone User Guide. https://support.apple.com/en-my/guide/iphone/ iph3e504502/ios
  • Apple. (2022, March 31). If your iPhone, iPad, or iPod touch is lost or stolen. https://support.apple.com/en-us/HT201472
  • Apple. (2022, August 15). Update macOS on Mac. https:// support.apple.com/en-us/HT201541
  • Australian Cyber Security Centre, cyber security framework, https://www.cyber.gov.au/
  • Australian Securities and Investment Commission. (2022, July 8). Cyber resilience good practices. https://asic.gov. au/regulatory-resources/digital-transformation/cyberresilience/cyber-resilience-good-practices/
  • Bernard, B. (2020, December 21). What is CIA (in cybersecurity)? Insights Blog. Deepwatch. https://www. deepwatch.com/blog/cia-in-cybersecurity/
  • Center for Internet Security, cyber security framework, https:// www.cisecurity.org
  • Cybercrime Act 2001 (Cth). https://www.legislation.gov.au/ Details/C2004A00937
  • Digital Transformations Hub. (n.d.). Understand your systems with a digital technology assets register. Retrieved September 8, 2022, from https://digitaltransformation. org.au/guides/it-management/understand-your-systemsdigital-technology-assets-register
  • Enterprise Management 360. (2020, July 21). Top 10 cyber threat intelligence tools [Video]. YouTube. https://youtu. be/8Q7pkNHhfHc
  • FireEye. (n.d.). FireEye cyber threat map [Visual Data]. Retrieved September 8, 2022, from https://www.fireeye. com/cyber-map/threat-map.html
  • Google Account Help. (n.d.). Find, lock, and erase a lost Android device. Retrieved September 8, 2022, from https:// support.google.com/accounts/answer/6160491?hl=en
  • Homeland Security. (2022, August 15). Cybersecurity. https:// www.dhs.gov/topics/cybersecurity
  • IBM Technology. (2019, May 2). What is a DDOS attack? [Video]. YouTube. https://www.youtube.com/ watch?v=z503nLsfe5s
  • IBM Technology. (2020, January 29). Data protection and compliance with IBM Cloud [Video]. YouTube. https:// youtu.be/AT6hhvanus8
  • IEEE Standards Association. (2017, April 14). How to obtain MAC addresses (English) [Video]. YouTube. https://www. youtube.com/watch?v=0nlkxVfyxL4
  • Kaspersky. (n.d.-a). Cyberthreat real-time map [Real-Time Data]. Retrieved September 8, 2022, from https:// cybermap.kaspersky.com/stats
  • Kaspersky. (n.d.-b). What is VPN? How it works, types of VPN. Retrieved September 8, 2022, from https://www.kaspersky. com/resource-center/definitions/what-is-a-vpn
  • Konverge Technologies. (n.d.). What is zero trust security and why is it so important? Retrieved September 8, 2022, from https://konverge.co.in/what-is-zero-trust-security-andwhy-is-it-so-important/
  • Kumar, C. (2022, September 6). 11 ways to view real-time cyberattack maps – Live hacking attack. Geekflare. https:// geekflare.com/real-time-cyber-attacks/
  • Markova, V. (2022, April 6). DNS tunneling attack – What is it, and how to protect ourselves? ClouDNS Blog. https:// www.cloudns.net/blog/dns-tunneling-attack-what-is-itand-how-to-protect-ourselves/
  • Maryville University. (n.d.). How to prevent cyberattacks: Top ways to protect yourself. Retrieved September 8, 2022, from https://online.maryville.edu/blog/how-to-preventcyber-attacks/
  • Microsoft. (n.d.). Secure access to resources with multifactor authentication. Retrieved September 8, 2022, from https://www.microsoft.com/en-us/security/business/ identity-access/azure-active-directory-mfa-multi-factorauthentication
  • Microsoft. (2021). Evolving zero trust: How real-world deployments and attacks are shaping the future of Zero Trust strategies. https://query.prod.cms.rt.microsoft.com/ cms/api/am/binary/RWJJdT
  • Microsoft. (2021, October 28). Password policy. https://docs. microsoft.com/enus/windows/security/threat-protection/ security-policy-settings/password-policy
  • Microsoft Security. (2020, November 24). How Azure Defender for SQL can protect SQL servers anywhere [Video]. YouTube. https://youtu.be/V7RdB6RSVpc
  • Miralis, D., Gibson, P., & Ceic, J. (2022). Cybersecurity laws and regulations Australia 2022. ICLG.com. Cybersecurity Laws and Regulations Report 2022 Australia (iclg.com)
  • Nord VPN. (2020, September 14). What is a VPN and how it works | NordVPN [Video]. YouTube. https://www.youtube. com/watch?v=yCWNRzoQGis
  • NIST, cyber security framework, https://www.nist.gov/ cyberframework
  • Norton. (2019, March 9). Security and the Internet of Things | #30SecTech by Norton [Video]. YouTube. https://www. youtube.com/watch?v=zUSCSmXH70I
  • Office of the Australian Information Commissioner. (n.d.). About the Notifiable Data Breaches scheme. Retrieved September 8, 2022, from https://www.oaic.gov.au/privacy/ notifiable-data-breaches/about-the-notifiable-databreaches-scheme
  • Office of the Australian Information Commissioner. (2021, October 25). Higher penalties to help protect Australian’s privacy. https://www.oaic.gov.au/updates/news-andmedia/higher-penalties-to-help-protect-australians-privacy
  • Palo Alto Networks. (n.d.). What is DNS tunneling? Cyberpedia. Retrieved September 8, 2022, from https:// www.paloaltonetworks.com/cyberpedia/what-is-dnstunnelling
  • PortSwigger. (n.d.). SQL injection. Retrieved September 8, 2022, from https://portswigger.net/web-security/sqlinjection
  • Privacy Amendment (Notifiable Data Breaches) Act 2017 (Cth). https://www.legislation.gov.au/Details/C2017A00012
  • Saab. (2020, October 28). Cyber security in focus: The vulnerability of the USB port. Saab Newsroom. https:// www.saab.com/newsroom/stories/2020/october/cybersecurity-in-focus-the-vulnerability-of-the-usb-port
  • Tidy, J. (2021, May 10). Colonial hack: How did cyber-attackers shut off pipeline? BBC News. https://www.bbc.com/news/ technology-57063636
  • TODAY. (2020, February 7). Beware of ‘juice jacking’ when you recharge your phone at a public station | TODAY [Video]. YouTube. https://www.youtube.com/watch?v=l5Jyb1a-JZk
  • U.S. Food and Drug Administration. (2021, November 4). Cybersecurity awareness for connected medical devices [Video]. YouTube. https://youtu.be/TU1w6fQ-yf8

The following copyright statements relate to content throughout this entire module.

©RTO Advice Group Pty. Ltd as trustee for RTO Trust (ABN 88 135 497 867) t/a Eduworks Resources 2021

Reproduced and modified under license by UP Education Online Pty Ltd.

© UP Education Australia Pty Ltd  2022

Except as permitted by the copyright law applicable to you, you may not reproduce or communicate any of the content on this website, including files downloadable from this website, without the permission of the copyright owner.

WARNING

This material has been reproduced and communicated to you by or on behalf of UP Education in accordance with section 113P of the Copyright Act 1968 ( the Act ).

The material in this communication may be subject to copyright under the Act. Any further reproduction or communication of this material by you may be the subject of copyright protection under the Act.

Do not remove this notice.

Activity software obtained under the MIT License

Copyright © 2016 Joubel AS

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

The software is provided "as is", without warranty of any kind, express or implied, including but not limited to the warranties of merchantability, fitness for a particular purpose and non-infringement. In no event shall the authors or copyright holders be liable for any claim, damages or other liability, whether in an action of contract, tort or otherwise, arising from, out of or in connection with the software or the use or other dealings in the software.

Module Linking
Main Topic Image
Developing programmer team reading computer codes Development Website design and coding technologies
Is Study Guide?
Off
Is Assessment Consultation?
Off