Riferimenti

References

Bibliography

  1. The Filter Bubble: What The Internet Is Hiding From You, Eli Pariser

  2. https://edu.gcfglobal.org/en/digital-media-literacy/what-is-an-echo-chamber/1/

  3. https://www.thepacer.net/the-destructive-nature-of-echo-chambers/

  4. SURVEY AND BRIEF HISTORY ON MALWARE IN NETWORK SECURITY CASE STUDY: VIRUSES, WORMS AND BOTS Saif Uldun Mostfa Kamal, Rana Jabbar Abd Ali, Haider Kamal Alani and Esraa Saad Abdulmajed Faculty of Information Science and Technology, National University of Malaysia (UKM), Malaysia

  5. https://www.kaspersky.com/resource-center/threats/computer-viruses-vs-worms

  6. Computer Viruses and Malware, John Aycock

  7. https://www.techtarget.com/searchsecurity/definition/worm

  8. https://www.unicef.org/turkiye/en/cyberbullying-what-it-and-how-stop-it

  9. https://www.stopbullying.gov/cyberbullying/what-is-it

  10. https://www.scamwatch.gov.au/protect-yourself/ways-to-spot-and-avoid-scams

  11. https://dictionary.cambridge.org/dictionary/english/scam

  12. https://bitdefender.gr/blog/scam-guide/

  13. https://www.le-vpn.com/online-scams/

  14. https://publicsafety.columbia.edu/scams

  15. Learning to detect phishing emails, Authors: Ian Fette, Norman Sadeh, Anthony Tomasic, 2007

  16. https://www.itgovernance.co.uk/blog/5-ways-to-detect-a-phishing-email

  17. https://cofense.com/knowledge-center/how-to-spot-phishing/

  18. 1st picture pharming - phishing

  19. https://www.propertycasualty360.com/2019/05/24/how-effective-employee-education-and-training-combats-phishing-attack-risk-414-155823/?slreturn=20231009104027

  20. An Overview of Darknet, Rise and Challenges and Its Assumptions, Zakariye Mohamud Omar, Jamaluddin Ibrahim, 2020, Faculty of Information and Communication Technology, International Islamic University Malaysia (IIUM), Kuala Lumpur, Malaysia

  21. The Darknet and the Future of Content Distribution Peter Biddle, Paul England, Marcus Peinado, and Bryan Willman

  22. https://cyberalert.gr/darknet/

  23. https://us.norton.com/blog/how-to/how-can-i-access-the-deep-web (picture)

  24. Privacy-preserving deanonymization of Dark Web Tor Onion services for criminal investigations, Ângelo, Daniel José Ferreira

  25. https://www.domaintools.com/resources/blog/dark-web-myths-and-misconceptions/

  26. https://www.soscanhelp.com/blog/dark-web-myths

  27. https://www.thinkuknow.co.uk/professionals/our-views/the-dark-web/

  28. A Comprehensive Survey on Ransomware Attack: A Growing Havoc Cyberthreat, Aditya Tandon and Anand Nayyar

  29. https://pandasecurity.com/en/mediacenter/avoid-ransomware/

  30. https://www.ncsc.gov.uk/ransomware/home#section_3

  31. https://nationalcrimeagency.gov.uk/who-we-are/publications/672-ransomware-extortion-and-the-cyber-crime-ecosystem/file

  32. A brief study of Wannacry Threat: Ransomware Attack 2017, Savita Mohurle & Manisha Patil, International Journal of Advanced Research in Computer Science

  33. https://cyberalert.gr/ransomware/

  34. PROTECTING SUB MODULE 4

https://link.springer.com/chapter/10.1007/978-1-4302-6383-8_7#Sec20 

  1. https://www.which.co.uk/reviews/troubleshooting-tips/article/how-to-create-secure-passwords-aHeGE9Q54s11

  2. https://www.verizon.com/articles/internet-essentials/antivirus-definition/

  3. https://antivirusjar.com/what-is-antivirus-software/

  4. https://www.vistainfosec.com/blog/gdpr-biometric-data-ethical-privacy/

  5. https://www.cookiebot.com/en/gdpr-cookies/

  6. https://www.william-russell.com/blog/global-transport-index/

  7. https://sweden.se/climate/sustainability/10-ways-to-a-greener-future

  8. https://swedishcleantech.com/cleantech-sectors/sustainable-transportation/

  9. https://www.linkedin.com/pulse/7-ways-digital-technologies-helping-protect-our-planet-contreras/

  10. https://www.unep.org/news-and-stories/story/how-digital-technology-and-innovation-can-help-protect-planet

  11. https://www.culturehive.co.uk/digital-heritage-hub/resource/planning/how-can-digital-help-us-become-more-environmentally-sustainable/

  12. https://paroleostili.it/manifesto/

  13. https://www.garanteprivacy.it/temi/cybersecurity/ransomware#:~:text=Il%20ransomware%20%C3%A8%20un%20programma,da%20pagare%20per%20%E2%80%9Cliberarli%E2%80%9D.



Ultime modifiche: giovedì, 13 giugno 2024, 19:02