References
The following sources were used to support cybersecurity concepts, threats, and protection strategies presented in this project.
- https://www.cisa.gov/cybersecurity
- https://owasp.org/www-project-top-ten/
- https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html
- https://www.ibm.com/topics/cybersecurity
- https://www.microsoft.com/en-us/security/business/security-101
- https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/
- https://www.kaspersky.com/resource-center/definitions/what-is-phishing
- https://www.nist.gov/cybersecurity
- https://www.fortinet.com/resources/cyberglossary
- https://www.sans.org/cyber-security-courses/
- https://www.verizon.com/business/resources/reports/dbir/
- https://www.eff.org/issues/cybersecurity