These are the sources and citations used to research ZAC - Information Assurance. This bibliography was generated on Cite This For Me on

  • Website

    Alliance, C.

    What is the cost of a negative review for your hotel?

    2017

    In-text: (Alliance)

    Your Bibliography: Alliance, Customer. "What Is The Cost Of A Negative Review For Your Hotel?." Customer Alliance. N.p., 2017. Web. 20 Dec. 2019.

  • Website

    Anthes, W.

    SWOT up on data privacy: ‘think positive, it’s a GDPR opportunity not a threat’

    2017

    In-text: (Anthes)

    Your Bibliography: Anthes, Will. "SWOT Up On Data Privacy: ‘Think Positive, It’S A GDPR Opportunity Not A Threat’." Global Marketing Alliance. N.p., 2017. Web. 21 Dec. 2019.

  • Website

    B2U

    PESTEL Analysis (PEST Analysis) EXPLAINED with EXAMPLES | B2U

    2016

    In-text: (B2U)

    Your Bibliography: B2U. "PESTEL Analysis (PEST Analysis) EXPLAINED With EXAMPLES | B2U." B2U - Business-to-you.com. N.p., 2016. Web. 5 Jan. 2020.

  • Blog

    Bauer, R.

    Ransomware: How to Prevent Being Attacked and Recover After an Attack

    2019

    In-text: (Bauer)

    Your Bibliography: Bauer, Roderick. "Ransomware: How To Prevent Being Attacked And Recover After An Attack." N.p., 2019. Web. 2 Jan. 2020.

  • Blog

    BlogPro

    The Pros and Cons of Hotel Loyalty Programs

    2019

    In-text: (BlogPro)

    Your Bibliography: BlogPro. "The Pros And Cons Of Hotel Loyalty Programs." N.p., 2019. Web. 20 Dec. 2019.

  • Website

    Bytes, M.

    Ransomware - What Is It & How To Remove It

    2018

    In-text: (Bytes)

    Your Bibliography: Bytes, Malware. "Ransomware - What Is It & How To Remove It." Malwarebytes. N.p., 2018. Web. 19 Dec. 2019.

  • Blog

    Delaney, D.

    2016

    In-text: (Delaney)

    Your Bibliography: Delaney, Draagh. N.p., 2016. Web. 19 Dec. 2019.

  • Website

    Details, C.

    CVE-2011-3192 : The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attac

    2011

    In-text: (Details)

    Your Bibliography: Details, CVE. "CVE-2011-3192 : The Byterange Filter In The Apache HTTP Server 1.3.X, 2.0.X Through 2.0.64, And 2.2.X Through 2.2.19 Allows Remote Attac." Cvedetails.com. N.p., 2011. Web. 18 Dec. 2019.

  • Website

    Details, C.

    CVE-2019-0190 : A bug exists in the way mod_ssl handled client renegotiations. A remote attacker could send a carefully crafted request

    2019

    In-text: (Details)

    Your Bibliography: Details, CVE. "CVE-2019-0190 : A Bug Exists In The Way Mod_Ssl Handled Client Renegotiations. A Remote Attacker Could Send A Carefully Crafted Request." Cvedetails.com. N.p., 2019. Web. 18 Dec. 2019.

  • Website

    Dobran, B.

    7 Proven Tactics To Prevent DDoS Attacks: Make a Security Plan Today!

    2018

    In-text: (Dobran)

    Your Bibliography: Dobran, Bojana. "7 Proven Tactics To Prevent Ddos Attacks: Make A Security Plan Today!." PhoenixNAP Global IT Services. N.p., 2018. Web. 18 Dec. 2019.

  • Website

    Dogru, T.

    Is Airbnb Really a Threat to Hotels? Here Is What the Data Tells Us.

    2019

    In-text: (Dogru)

    Your Bibliography: Dogru, Tarik. "Is Airbnb Really A Threat To Hotels? Here Is What The Data Tells Us.." The National Interest. N.p., 2019. Web. 20 Dec. 2019.

  • Website

    Edge, P.

    Is the data you hold at risk of breach?

    2018

    In-text: (Edge)

    Your Bibliography: Edge, Premier. "Is The Data You Hold At Risk Of Breach?." Premieredge. N.p., 2018. Web. 18 Dec. 2019.

  • Website

    Elmansy, R.

    SWOT Analysis for the UK’s Brexit Decision to Leave the EU

    2016

    In-text: (Elmansy)

    Your Bibliography: Elmansy, Rafiq. "SWOT Analysis For The UK’S Brexit Decision To Leave The EU." Designorate. N.p., 2016. Web. 20 Dec. 2019.

  • E-book or PDF

    FBI

    An Introduction to Detecting and Deterring an Insider Spy

    2016 - FBI

    In-text: (FBI)

    Your Bibliography: FBI. An Introduction To Detecting And Deterring An Insider Spy. FBI, 2016. Web. 19 Dec. 2019.

  • Website

    Fimin, M.

    Council Post: Five Benefits GDPR Compliance Will Bring To Your Business

    2018

    In-text: (Fimin)

    Your Bibliography: Fimin, Michael. "Council Post: Five Benefits GDPR Compliance Will Bring To Your Business." Forbes.com. N.p., 2018. Web. 21 Dec. 2019.

  • Website

    Governance

    GDPR Penalties and Fines | IT Governance UK

    2018

    In-text: (Governance)

    Your Bibliography: Governance. "GDPR Penalties And Fines | IT Governance UK." Itgovernance.co.uk. N.p., 2018. Web. 21 Dec. 2019.

  • Blog

    Harper, E.

    Hotel Booking Sites May Be Leaking Your Personal Information

    2019 - Techlicious.com

    In-text: (Harper)

    Your Bibliography: Harper, Elizabeth. "Hotel Booking Sites May Be Leaking Your Personal Information." Techlicious.com. N.p., 2019. Web. 2 Jan. 2020.

  • Website

    Jones, M.

    Opportunities and threats for hotels in the post Brexit world

    2016

    In-text: (Jones)

    Your Bibliography: Jones, Martin. "Opportunities And Threats For Hotels In The Post Brexit World." UHY Hacker Young. N.p., 2016. Web. 2 Jan. 2020.

  • E-book or PDF

    Kaspersky

    RANSOMWARE: ALL LOCKED UP AND NO PLACE TO GO

    2016

    In-text: (Kaspersky)

    Your Bibliography: Kaspersky. RANSOMWARE: ALL LOCKED UP AND NO PLACE TO GO. 2016. Web. 2 Jan. 2020.

  • Website

    Kundaliya, D.

    Cyber criminals demand $3 million in ransom from Travelex after infecting its network with Sodinokibi ransomware | Computing

    2020

    In-text: (Kundaliya)

    Your Bibliography: Kundaliya, Dev. "Cyber Criminals Demand $3 Million In Ransom From Travelex After Infecting Its Network With Sodinokibi Ransomware | Computing." http://www.computing.co.uk. N.p., 2020. Web. 7 Jan. 2020.

  • Website

    Luty, J.

    Average spend on staycation holiday 2011-2018 | Statista

    2019

    In-text: (Luty)

    Your Bibliography: Luty, Jennifer. "Average Spend On Staycation Holiday 2011-2018 | Statista." Statista. N.p., 2019. Web. 20 Dec. 2019.

  • Website

    Marquette Poremba, S.

    How to Stop Insider Security Threats to Your Business

    2018

    In-text: (Marquette Poremba)

    Your Bibliography: Marquette Poremba, Sue. "How To Stop Insider Security Threats To Your Business." Business News Daily. N.p., 2018. Web. 19 Dec. 2019.

  • Blog

    Marsh, J.

    DDoS monitoring: how to know you’re under attack

    2017 - Solarwinds loggly

    In-text: (Marsh)

    Your Bibliography: Marsh, Jennifer. "Ddos Monitoring: How To Know You’Re Under Attack." Solarwinds loggly. N.p., 2017. Web. 18 Dec. 2019.

  • Blog

    Matthews, T.

    How to Recover in the Aftermath of a DDoS Attack

    2016 - imperva

    In-text: (Matthews)

    Your Bibliography: Matthews, Tim. "How To Recover In The Aftermath Of A Ddos Attack." imperva. N.p., 2016. Web. 2 Jan. 2020.

  • Website

    Mitchell, A.

    Data Security in Hospitality - Why Is It So Important?

    2019

    In-text: (Mitchell)

    Your Bibliography: Mitchell, Alex. "Data Security In Hospitality - Why Is It So Important?." Hospitality Net. N.p., 2019. Web. 9 Jan. 2020.

  • Website

    Montevago, J.

    Airbnb Launches Hotel Distribution Platform

    2018

    In-text: (Montevago)

    Your Bibliography: Montevago, Jessica. "Airbnb Launches Hotel Distribution Platform." Travelmarketreport.com. N.p., 2018. Web. 20 Dec. 2019.

  • Website

    Morley, K. and Willgress, L.

    'Staycation' boost to UK economy as millions of families shun foreign holidays

    2016

    In-text: (Morley and Willgress)

    Your Bibliography: Morley, Katie, and Lydia Willgress. "'Staycation' Boost To UK Economy As Millions Of Families Shun Foreign Holidays." The Telegraph. N.p., 2016. Web. 20 Dec. 2019.

  • Website

    NTT

    10 Ways to Reduce Your Cyber Insurance Premiums - Secure-24

    2017

    In-text: (NTT)

    Your Bibliography: NTT. "10 Ways To Reduce Your Cyber Insurance Premiums - Secure-24." Secure 24. N.p., 2017. Web. 2 Jan. 2020.

  • Blog

    Office, H.

    Media factsheet: EU citizens and freedom of movement

    2019

    In-text: (Office)

    Your Bibliography: Office, Home. "Media Factsheet: EU Citizens And Freedom Of Movement." N.p., 2019. Web. 20 Dec. 2019.

  • Website

    Owasp

    SQL Injection Prevention · OWASP Cheat Sheet Series

    2009

    In-text: (Owasp)

    Your Bibliography: Owasp. "SQL Injection Prevention · OWASP Cheat Sheet Series." Cheatsheetseries.owasp.org. N.p., 2009. Web. 18 Dec. 2019.

  • Website

    Owasp

    Top 10-2017 A1-Injection - OWASP

    2017

    In-text: (Owasp)

    Your Bibliography: Owasp. "Top 10-2017 A1-Injection - OWASP." Owasp.org. N.p., 2017. Web. 18 Dec. 2019.

  • Website

    Ozkaya, E. and Diogenes, Y.

    Cybersecurity - Attack and Defense Strategies

    2018

    In-text: (Ozkaya and Diogenes)

    Your Bibliography: Ozkaya, Erdal, and Yuri Diogenes. "Cybersecurity - Attack And Defense Strategies." O’Reilly | Safari. N.p., 2018. Web. 19 Dec. 2019.

  • Blog

    Petters, J.

    What is an Insider Threat? Definition and Examples

    2019 - Varonis

    In-text: (Petters)

    Your Bibliography: Petters, Jeff. "What Is An Insider Threat? Definition And Examples." Varonis. N.p., 2019. Web. 3 Jan. 2020.

  • Blog

    Reid, R.

    Recovering from an SQL injection hack

    2008 - strictly-software

    In-text: (Reid)

    Your Bibliography: Reid, Rob. "Recovering From An SQL Injection Hack." strictly-software. N.p., 2008. Web. 2 Jan. 2020.

  • Website

    Reynolds, M.

    UK is second most targeted nation for DDoS attacks

    2016

    In-text: (Reynolds)

    Your Bibliography: Reynolds, Matt. "UK Is Second Most Targeted Nation For Ddos Attacks." Wired.co.uk. N.p., 2016. Web. 18 Dec. 2019.

  • Blog

    Ross, A.

    UK businesses are failing to adequately test their disaster recovery systems

    2019

    In-text: (Ross)

    Your Bibliography: Ross, Andrew. "UK Businesses Are Failing To Adequately Test Their Disaster Recovery Systems." N.p., 2019. Web. 2 Jan. 2020.

  • Website

    Rubens, P.

    How to Prevent DDoS Attacks: 6 Tips to Keep Your Website Safe

    2018

    In-text: (Rubens)

    Your Bibliography: Rubens, Paul. "How To Prevent Ddos Attacks: 6 Tips To Keep Your Website Safe." Esecurityplanet.com. N.p., 2018. Web. 18 Dec. 2019.

  • Website

    Schools, S.

    PHP MySQL Prepared Statements

    2014

    In-text: (Schools)

    Your Bibliography: Schools, S3. "PHP Mysql Prepared Statements." W3schools.com. N.p., 2014. Web. 18 Dec. 2019.

  • Website

    Shah, R.

    DDoS: a seven-point action plan

    2014

    In-text: (Shah)

    Your Bibliography: Shah, Rakesh. "Ddos: A Seven-Point Action Plan." Continuitycentral.com. N.p., 2014. Web. 2 Jan. 2020.

  • Blog

    Shewan, D.

    How to Do a SWOT Analysis for Your Small Business (with Examples)

    2019 - WordStream

    In-text: (Shewan)

    Your Bibliography: Shewan, Dan. "How To Do A SWOT Analysis For Your Small Business (With Examples)." WordStream. N.p., 2019. Web. 4 Jan. 2020.

  • Website

    Smith, J.

    Five steps to a successful towel and linen reuse scheme | WTM Insights

    2015

    In-text: (Smith)

    Your Bibliography: Smith, Jeremy. "Five Steps To A Successful Towel And Linen Reuse Scheme | WTM Insights." WTM Insights. N.p., 2015. Web. 28 Dec. 2019.

  • Website

    swcsc

    Ransomware Attack - what to do if you've had one - urgent action steps

    2016

    In-text: (swcsc)

    Your Bibliography: swcsc. "Ransomware Attack - What To Do If You've Had One - Urgent Action Steps." South West Cyber Security Cluster. N.p., 2016. Web. 2 Jan. 2020.

  • Website

    Sweney, M.

    Marriott to be fined nearly £100m over GDPR breach

    2019

    In-text: (Sweney)

    Your Bibliography: Sweney, Mark. "Marriott To Be Fined Nearly £100M Over GDPR Breach." the Guardian. N.p., 2019. Web. 3 Jan. 2020.

  • Website

    Taylor, B.

    SQL Injection ... It's Continuing - but How Do You Recover? - SSWUG.ORG

    2008

    In-text: (Taylor)

    Your Bibliography: Taylor, Ben. "SQL Injection ... It's Continuing - But How Do You Recover? - SSWUG.ORG." SSWUG.ORG. N.p., 2008. Web. 2 Jan. 2020.

  • Website

    Techopedia

    What is Information Assurance (IA)? - Definition from Techopedia

    2011

    In-text: (Techopedia)

    Your Bibliography: Techopedia. "What Is Information Assurance (IA)? - Definition From Techopedia." Techopedia.com. N.p., 2011. Web. 3 Jan. 2020.

  • Website

    Touch, O.

    Will Brexit cause a rise in domestic holidays?

    2019

    In-text: (Touch)

    Your Bibliography: Touch, One. "Will Brexit Cause A Rise In Domestic Holidays?." One Touch Property Investment. N.p., 2019. Web. 20 Dec. 2019.

  • Website

    which

    How to remove ransomware viruses

    2017

    In-text: (which)

    Your Bibliography: which. "How To Remove Ransomware Viruses." Which Computing Helpdesk. N.p., 2017. Web. 2 Jan. 2020.

  • Website

    Wiki

    1993 Bournemouth bombing

    2017

    In-text: (Wiki)

    Your Bibliography: Wiki. "1993 Bournemouth Bombing." En.wikipedia.org. N.p., 2017. Web. 20 Dec. 2019.

  • Website

    Wiki

    WannaCry ransomware attack

    2017

    In-text: (Wiki)

    Your Bibliography: Wiki. "Wannacry Ransomware Attack." En.wikipedia.org. N.p., 2017. Web. 19 Dec. 2019.

  • Website

    Williamson, R.

    No-deal Brexit could trigger a recession next year

    2019

    In-text: (Williamson)

    Your Bibliography: Williamson, Ross. "No-Deal Brexit Could Trigger A Recession Next Year." KPMG. N.p., 2019. Web. 20 Dec. 2019.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Super fast and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join