DNS - Domain name system. Retrieved from http://compnetworking.about.com/cs/domainnamesystem/g/bldef_dns.htm Rosato, R. (2014). Best practices for applying service packs, hotfixes and security patches. Retrieved from http://technet.microsoft.com/en-us/library/cc750077.aspx Rouse, M. (2007). DMZ (Demilitarized zone).
Six Benefits of IPv6. Network Computing. Retrieved March 28, 2014, from http://www.networkcomputing.com/ipv6/six-benefits-of-ipv6/230500009 Odom, W. (2012). CCENT/CCNA ICND1 640-822 official cert guide (3rd ed.). Indianapolis, IN: Cisco Press.
Retrieved January 19, 2014 from http://technet.microsoft.com/en-us/library/ms161962.aspx Ponemon Institute. (2012). The Human Factor in Data Protection. Retrieved January 19, 2014 from http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt_trend-micro_ponemon-survey-2012.pdf
Decoded Node. [Online] Available at: http://sapphirepaw.blogspot.co.uk/2012/02/tls-nee-ssl-and-ssh-compact-comparison.html [Accessed 24 March 2014]. Tang, A., 2013. Pros and Cons of SSH Disclosed. [Online] Available at: http://besthostingsearch.net/tutorial/ssh-pros-cons/ [Accessed 26 March 2014].
(2009). VPN tunneling protocols. Retrieved from http://technet.microsoft.com/en-us/library/dd469817(v=ws.10).aspx Perrin, C. (2008). Understanding layered security and defense in depth. Retrieved from http://www.techrepublic.com/blog/it-security/understanding-layered-security-and-defense-in-depth/#.
History Channel Website. Accessed February 6, 2014. http://www.history.com/interactives/witness-to-911#/wtc-building-5/. “Pentagon.” In Britannica. Accessed March 4, 2014. http://school.eb.com/levels/middle/article/332844. “September 11th Attacks.” In Britannica.
President Obama has realized the seriousness of the upcoming threats and turned the government focus more toward defending the information and communications infrastructure and In May 2009, he issued a request from top to bottom review of the current situation. The report titled the Cyberspace Policy Review includes strategy, policy, and standards regarding the security of and operations in cyberspace. According the white house’s cybersecurity foreign policy, the Cyberspace Policy Review highlighted two objectives and ten near-term actions to support the cybersecurity strategy. Objectives Improve the infrastructure resilience to cyber incidents Reduce the cyber threat Near Term Actions Appoint a cybersecurity policy official responsible for coordinating the Nation’s cybersecurity policies and activities. Prepare for the President’s approval an updated national strategy to secure the information and communications infrastructure.