References
Bay, M. (2016). What is Cybersecurity? French Journal for Media Research, 6. Retrieved from https://frenchjournalformediaresearch.com/lodel-1.0/main/docannexe/file/988/morten_pdf.pdf
Bader, B. (2022). 4 network security tips for the hybrid workplace: The best defense is a strong, proactive offense. New Hampshire Business Review, 14. Retrieved from http://ezproxy.bgsu.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=b9h&AN=155855736&site=ehost-live&scope=site
Cisco. (2022, February 17). What is computer networking? Cisco. Retrieved May 25, 2022, from https://www.cisco.com/c/en/us/solutions/enterprise-networks/what-is-computer-networking.html
Cynet XDR | Autonomous Breach Protection. (2022, May 16). Network Attacks and Network Security Threats. Retrieved May 25, 2022, from https://www.cynet.com/network-attacks/network-attacks-and-network-security-threats/#:~:text=What%20Is%20a%20Network%20Attack%3F,or%20perform%20other%20malicious%20activity.
Daya, B. (2013). Network security: History, importance, and future. University of Florida Department of Electrical and Computer Engineering, 4. Retrieved from http://www.alphawireless.co.za/wp-content/uploads/2013/01/Network-Security-article.pdf
DNSstuff. (2020, September 28). Network troubleshooting: Steps, techniques, best practices. Retrieved May 26, 2022, from https://www.dnsstuff.com/network-troubleshooting-steps
Fouad, N. S. (2021). Securing higher education against cyberthreats: from an institutional risk to a national policy challenge. Journal of Cyber Policy, 6(2), 137-154.
Gero, S., Back, S., LaPrade, J., & Kim, J. (2021). Malware Infections in the US during the COVID-19 Pandemic: An Empirical Study. International Journal of Cybersecurity Intelligence & Cybercrime, 4(2), 25-37.
Higgins, M. (2022, May 19). Does a VPN protect you from hackers? NordVPN. Retrieved May 28, 2022, from https://nordvpn.com/blog/does-a-vpn-protect-you-from-hackers/
Lovegrove, B. (2020, Feb 13). How To Protect Yourself Against Cyber Attacks. 7 Cyber Security Tips. [Video]. YouTube. Retrieved from https://www.youtube.com/watch?v=GQCnQr5Hmhc
Lukehart, A. (2021, March 30). Formjacking: The online scam hidden in your website code. IFP. Retrieved May 26, 2022, from https://www.insightsforprofessionals.com/it/security/formjacking-online-scam-hidden-in-website-code
Sander, A. (2021, July 8). The high cost of phishing in K-12 schools. Security Boulevard. Retrieved May 26, 2022, from https://securityboulevard.com/2021/07/the-high-cost-of-phishing-in-k-12-schools/#:~:text=Costs%20of%20Phishing%20Attacks%20in%20Schools%20Have%20Reached%20New%20Highs&text=From%202016%20through%202020%2C%20the,from%20a%20single%20school%20district.
Simplilearn. (2020, June 10). Cyber Security In 7 Minutes | What Is Cyber Security: How It Works? | Cyber Security [Video]. YouTube. Retrieved from https://www.youtube.com/watch?v=inWWhr5tnEA
Wang, L., & Wyglinski, A. M. (2016). Detection of man-in-the-middle attacks using physical layer wireless security techniques. Wireless Communications & Mobile Computing, 16(4), 408–426. https://doi-org.ezproxy.bgsu.edu/10.1002/wcm.2527
What is a denial of service attack (dos)? Palo Alto Networks. (n.d.). Retrieved May 26, 2022, from https://www.paloaltonetworks.com/cyberpedia/what-is-a-denial-of-service-attack-dos