References and Copyright

Submitted by Katie.Koukouli… on Mon, 12/18/2023 - 16:07
Sub Topics
  • AskPython. (n.d.). Creating a Python Keylogger in 10 Lines of Code. Retrieved October 24, 2022, from https://www. askpython.com/python/examples/python-keylogger
  • Bahbah, R. (2021, October 19). Essential Eight vs NIST CSF: Cybsersecurity In Focus. Retrieved October 24, 2022, from https://www.businessnews.com.au/article/Essential-Eight-vs-NIST-CSF-Cybersecurity-In-Focus
  • Bates, P. (2022, July 4). 5 Ways Hackers Use Public Wi-Fi to Steal Your Identity. www.makeuseof.com. Retrieved October 24, 2022, from https://www.makeuseof.com/ tag/5-ways-hackers-can-use-public-wi-fi-steal-identity/
  • Chavali, S. (2018, March 22, Updated 2020, May 5). 5 Examples of Insider Threat-Caused Breaches That Illustrate the Scope of the Problem. Proofpoint. Retrieved October 24, 2022, from https://www.proofpoint.com/us/blog/ insider-threat-management/5-examples-insider-threat-caused-breaches-illustrate-scope-problem
  • cisco. (n.d.). What is Zero-Trust Networking?. Retrieved October 24, 2022, from https://www.cisco.com/c/en/us/ solutions/automation/what-is-zero-trust-networking.html
  • Cyberrisk Institute. (n.d.). The Profile is the benchmark for cyber risk assessment. Retrieved October 24, 2022, from https://cyberriskinstitute.org/the-profile/
  • Department of Climate Change, Energy, The Environment and Water. (n.d.). Australian Energy Sector Cyber Security Framework. Australian Government. Retrieved October 24, 2022, from https://www.energy.gov.au/government-priorities/energy-security/australian-energy-sector-cyber-security-framework
  • Flexential. (2017, September 12). Do you know your cybersecurity risk profile? Retrieved October 24, 2022, from https://www.flexential.com/resources/blog/do-you-know-your-cybersecurity-risk-profile
  • GDPR.EU. (n.d.). What is GDPR, the EU’s new data protection law?. Retrieved October 24, 2022, from https://gdpr.eu/ what-is-gdpr/
  • Gilbert + Tobin. (2021, November 22). Security of Critical Infrastructure Act (SOCI) reforms – what your business needs to know. Retrieved October 24, 2022, from https://www.gtlaw.com.au/knowledge/security-critical-infrastructure-act-soci-reforms-what-your-business-needs-know
  • IBM. (n.d.). Intrusion Detection and Prevention System (IDPS) Management. Retrieved October 24, 2022, from https:// www.ibm.com/security/services/intrusion-detection-and-prevention-system-management
  • Lauterbach, C. (2020, July 16). 7 IT Service Cybersecurity Threats From Inside a Company And How To Defend Against Them. Be Structured Technology Group. Retrieved October 24, 2022, from https://bestructured.com/7-it-service-internal-cybersecurity-threats-and-how-to-defend-them/
  • Malwarebytes. (n.d.). What is a keylogger?. Retrieved October 24, 2022, from https://www.malwarebytes.com/keylogger
  • Martin, B. (2019, Novemebr 29). Three benchmarks to inform cyber security spending plans for 2020. Integrity360. Retrieved October 24, 2022, from https://insights. integrity360.com/security-spending
  • Millard, G. (2018, July 30). Cybersecurity Benchmarking: Where’s The Data?. tenable. Retrieved October 24, 2022, from https://www.tenable.com/blog/cybersecurity-benchmarking-where-s-the-da
  • NIST. (2018, February 5). Framework Documents. Retrieved October 24, 2022, from https://www.nist.gov/ cyberframework/framework
  • Office of the Australian Information Commissioner. (2019, July 13). Part 1: Data breaches and the Australian Privacy Act. Retrieved October 24, 2022, from https://www.oaic.gov. au/privacy/guidance-and-advice/data-breach-preparation-and-response/part-1-data-breaches-and-the-australian-privacy-act
  • Peacock, J. (n.d.). What are the CIS Implementation Groups?. Cybersaint. Retrieved October 24, 2022, from https://www. cybersaint.io/blog/cis-critical-security-controls
  • Privacy Act 1988 (Austl.) as in force on 12 March 2014. Retrieved October 24, 2022, from https://www.legislation. gov.au/Details/C2014C00076
  • SANS Institute. (2021, April 21). CIS Controls v8. Retrieved October 24, 2022, from https://www.sans.org/blog/cis-controls-v8/
  • SecurityScorecard. (2020, April 13). The Importance of Cybersecurity Benchmarks for Organizations. Retrieved October 24, 2022, from https://securityscorecard.com/ blog/security-ratings-benchmark-cybersecurity-program
  • Tollefson, R. (2020, May 19). Cybersecurity budgeting and spending trends 2020: How does yours compare?. Infosec. Retrieved October 24, 2022, from https://resources. infosecinstitute.com/topic/cybersecurity-budgeting-and-spending-trends/
  • Victorian State Government Department of Health. (2015, November 12). Health Records Act. Retrieved October 24, 2022, from https://www.health.vic.gov.au/legislation/health-records-act
  • Wright, S. (2022, October 10). Whistleblower laws in Australia. Gibbs Wright Litigation Lawyers. Retrieved October 24, 2022, from https://gibbswrightlawyers.com.au/ publications/whistleblower-laws-in-australia 

© Copyright 2022 RTO Advice Group Pty. Ltd.

All rights reserved. This publication is copyright to RTO Advice Group, Melbourne, Victoria. No part of this publication or its supporting documents may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without prior written permission from the publisher.

© UP Education Online Pty Ltd 2023

Except as permitted by the copyright law applicable to you, you may not reproduce or communicate any of the content on this website, including files downloadable from this website, without the permission of the copyright owner

WARNING

This material has been reproduced and communicated to you by or on behalf of UP Education in accordance with section 113P of the Copyright Act 1968 (the Act).

The material in this communication may be subject to copyright under the Act. Any further reproduction or communication of this material by you may be the subject of copyright protection under the Act.

Do not remove this notice.

Activity software obtained under the MIT License

Copyright (c) 2016 Joubel AS

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Module Linking
Main Topic Image
 Bottom view of caucasian guy using laptop and looking away in office space
Is Study Guide?
Off
Is Assessment Consultation?
Off