This page contains all of the references and Acknolgements that went into completeing this project.
Accessibility. (2019, January 07). Retrieved from https://en.wikipedia.org/wiki/Accessibility
Afzali, P., Nassiri, R., Azmayandeh, E., & Shabgahi, G. L. (2010). Effective Governance through simultaneous use of COBIT and Val IT. 2010 International Conference on Education and Management Technology. doi:10.1109/icemt.2010.5657549
Audit. (2018, December 08). Retrieved from https://en.wikipedia.org/wiki/Audit
Biscontini, T. (2018). Malware. Salem Press Encyclopedia. Retrieved from http://search.ebscohost.com.proxy.kennesaw.edu/login.aspx?direct=true&db=ers&AN=87323252&site=eds-live&scope=site
Business case. (2018, December 17). Retrieved from https://en.wikipedia.org/wiki/Business_case
Business process. (2018, December 28). Retrieved from https://en.wikipedia.org/wiki/Business_process
Business requirements. (2018, September 04). Retrieved January 14, 2019, from https://en.wikipedia.org/wiki/Business_requirements
Business value. (2018, February 06). Retrieved January 14, 2019, from https://en.wikipedia.org/wiki/Business_value
Case study. (2019, January 14). Retrieved January 14, 2019, from https://en.wikipedia.org/wiki/Case_study
Close the door to access control leaks with Security Policy Tool! (n.d.). Retrieved June 19, 2019, from https://securitypolicytool.com/
Cloud computing. (2019, July 17). Retrieved from https://en.wikipedia.org/wiki/Cloud_computing
Crelin, J. (2018). Denial-of-service attack. Salem Press Encyclopedia. Retrieved from http://search.ebscohost.com.proxy.kennesaw.edu/login.aspx?direct=true&db=ers&AN=90558289&site=eds-live&scope=site
Cooper, P. G. (2018). Phishing. Salem Press Encyclopedia. Retrieved from http://search.ebscohost.com.proxy.kennesaw.edu/login.aspx?direct=true&db=ers&AN=89139014&site=eds-live&scope=site
Data based decision making. (2018, September 22). Retrieved January 14, 2019, from https://en.wikipedia.org/wiki/Data_based_decision_making
Data breach. (2019, July 14). Retrieved from https://en.wikipedia.org/wiki/Data_breach
Domain. (n.d.). Retrieved from https://techterms.com/definition/domain
EDUCAUSE, Risk Management Policy Template for Universities, 2008. Retrieved 21 Jan 17 from https://net.educause.edu/ir/library/word/CSD5368.doc
Exploit (computer security). (2019, March 02). Retrieved from https://en.wikipedia.org/wiki/Exploit_(computer_security)
Governance. (2018, December 15). Retrieved January 14, 2019, from https://en.wikipedia.org/wiki/Governance
Harmon, A. (2019). SWOT analysis. Salem Press Encyclopedia. Retrieved from http://search.ebscohost.com.proxy.kennesaw.edu/login.aspx?direct=true&db=ers&AN=100259317&site=eds-live&scope=site
Home. (n.d.). Retrieved June 19, 2019, from https://www.simplerisk.com/
Human factors and ergonomics. (2018, December 26). Retrieved January 14, 2019, from https://en.wikipedia.org/wiki/Human_factors_and_ergonomics
Information technology management. (2018, December 12). Retrieved January 14, 2019, from https://en.wikipedia.org/wiki/Information_technology_management
IP address. (2019, July 03). Retrieved from https://en.wikipedia.org/wiki/IP_address
ISACA, Basic Foundational Concepts Student Book: Using COBIT® 5. 2014
ISACA, COBIT®5 for Risk. 2013. Retrieved 21 Jan 17 from http://www.isaca.org/cobit/pages/risk-product-page.aspx
ISACA: Tips for Moving From a Controls-Based Approach to a Risk-Based Approach. (2019, May 29). Retrieved from https://axio.com/blog/isaca-tips-for-moving-from-a-controls-based-approach-to-a-risk-based-approach/
IT Capability. (n.d.). Retrieved from https://cio-wiki.org/wiki/IT_Capability#cite_note-1
IT Governance Institute. IT Governance Using COBIT and ValIT: Student Book, 2ndEdition. 2007.
IT Strategy & review. (n.d.). Retrieved from http://www.oakleigh.co.uk/page/121/Services/Technology/Articles/IT-strategy-definition-and-review
Lasky, J. (2018). Firewall. Salem Press Encyclopedia of Science. Retrieved from http://search.ebscohost.com.proxy.kennesaw.edu/login.aspx?direct=true&db=ers&AN=87323146&site=eds-live&scope=site
MA, A. K. P. A. (2019). Social engineering. Salem Press Encyclopedia. Retrieved from http://search.ebscohost.com.proxy.kennesaw.edu/login.aspx?direct=true&db=ers&AN=89677630&site=eds-live&scope=site
Miller, K. W., & Voas, J. (2008). Computer Scientist, Software Engineer, or IT Professional: Which Do You Think You Are? IT Professional,10(4), 4-6. doi:10.1109/mitp.2008.64
Operation. (n.d.). Retrieved January 14, 2019, from https://www.merriam-webster.com/dictionary/operation
Planning. (2019, January 04). Retrieved January 14, 2019, from https://en.wikipedia.org/wiki/Planning
Risk. (2019, July 06). Retrieved from https://en.wikipedia.org/wiki/Risk
Software: Definition of software in English by Lexico Dictionaries. (n.d.). Retrieved from https://www.lexico.com/en/definition/software
What Is A Botnet? (n.d.). Retrieved from https://us.norton.com/internetsecurity-malware-what-is-a-botnet.html
What is a Process Owner? - Definition from Techopedia. (n.d.). Retrieved January 14, 2019, from https://www.techopedia.com/definition/4525/process-owner
What is Information Security Policy? - Definition from Techopedia. (n.d.). Retrieved from https://www.techopedia.com/definition/24838/information-security-policy
What is pen test (penetration testing)? - Definition from WhatIs.com. (n.d.). Retrieved from https://searchsecurity.techtarget.com/definition/penetration-testing
Woodbury Hooper, M. (2018). Virtual private network (VPN). Salem Press Encyclopedia. Retrieved from http://search.ebscohost.com.proxy.kennesaw.edu/login.aspx?direct=true&db=ers&AN=90558496&site=eds-live&scope=site