logo Assignment 1: Cybersecurity in Information Technology

Bibliography

image source 1 : https://www.nortonsecurityonline.com/blog/

image source 2: https://criptomoneda.ninja/fondos-pantalla-bitcoin/

image source 3: https://www.pinterest.com.au/pin/346284658833669660/

5 Cybersecurity Challenges and Trends: What to Expect in 2018. (n.d.). Retrieved from https://www.globalsign.com/en/blog/cybersecurity-trends-and-challenges-2018/

Cyber Security Threats in 2019. (2019, January 21). Retrieved from https://onlinedegrees.sandiego.edu/top-cyber-security-threats/

Ben.arthur. (2018, February 20). Cyber security challenges of 2018. Retrieved from https://www.cert.gov.au/news/cyber-security-challenges-2018

10 cyber security trends to look out for in 2019. (2018, December 13). Retrieved from https://www.information-age.com/10-cyber-security-trends-look-2019-123463680/

Dolly, J., Dolly, J., & IDG Contributor Network. (2017, December 11). Top 5 cybersecurity concerns for 2018. Retrieved from https://www.csoonline.com/article/3241766/top-5-cybersecurity-concerns-for-2018.html

(2019). Retrieved from https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-evolution-of-ransomware.pdf

Pal, A. (2019, April 16). The Internet of Things (IoT) – Threats and Countermeasures. Retrieved from https://www.cso.com.au/article/575407/internet-things-iot-threats-countermeasures/

Kashyap. (2019, March 11). 10 Real World Applications of Internet of Things (IoT) - Explained in Videos. Retrieved from https://www.analyticsvidhya.com/blog/2016/08/10-youtube-videos-explaining-the-real-world-applications-of-internet-of-things-iot/

Khatwani, S. (2019, January 22). Cryptojacking : How Hackers Are Mining Cryptocurrencies Without Your Knowledge. Retrieved from https://coinsutra.com/cryptojacking/

RSA algorithm. (2019, April 11). Retrieved from https://simple.wikipedia.org/wiki/RSA_algorithm

Hatmaker, T., & Hatmaker, T. (2018, May 08). Cryptojacking malware was secretly mining Monero on many government and university websites. Retrieved from https://techcrunch.com/2018/05/08/coinhive-malware-may-troy-mursch/

Trendmicro. (2018, March 21). Autonomous Vehicle Incident Stresses Security Issues With Connected Cars. Retrieved from https://www.trendmicro.com/us/iot-security/special/312

Nadeau, M. (2018, December 13). What is cryptojacking? How to prevent, detect, and recover from it. Retrieved from https://www.csoonline.com/article/3253572/what-is-cryptojacking-how-to-prevent-detect-and-recover-from-it.html?page=2

Ciobica, V. (2018, July 03). Japan Court Sentenced Crypto Miner to One Year of Jail Time. Retrieved from https://coindoo.com/japan-sentenced-crypto-miner-to-one-year-of-jail-time/

Murphy, M. (2018, January 29). YouTube shuts down hidden cryptojacking adverts. Retrieved from https://www.telegraph.co.uk/technology/2018/01/29/youtube-shuts-hidden-crypto-jacking-adverts

Krebs on Security. (n.d.). Retrieved from https://krebsonsecurity.com/2018/03/who-and-what-is-coinhive/

Avnet: Quality Electronic Components & Services. (2019). Retrieved from https://www.avnet.com/wps/wcm/connect/onesite/1afd11cd-8110-4120-9ac3-30883729f32f/Automotive+IoT+Security.pdf?MOD=AJPERES

What Is A Botnet? (n.d.). Retrieved from https://au.norton.com/internetsecurity-malware-what-is-a-botnet.html

Administration. (2018, November 14). Could your smart car be hacked? Retrieved from https://lighthouse.mq.edu.au/article/could-your-car-be-hacked

Could your car be hacked? Smart cars pose cybersecurity concerns. (n.d.). Retrieved from https://www.unr.edu/nevada-today/news/2017/secure-smart-cars

(2019). Retrieved from https://elinux.org/images/f/f8/Common-Attacks-on-IoT-Devices-Christina-Quast.pdf

Claburn, T. (2018, January 29). Crypto-jackers slip Coinhive mining code into YouTube site ads. Retrieved from https://www.theregister.co.uk/2018/01/27/cryptojackers_slip_coinhive_mining_code_into_doubleclick_ads/

Cryptojacking • Page 1 • Tag • The Register. (n.d.). Retrieved from https://www.theregister.co.uk/Tag/cryptojacking