Home Project Title Page Introduction Background Potential Benefits Further Required Research Conclusion References

two men shaking hands via a computer
References

Computer Networks; iSheriff: Channel Partners Hungry for SaaS. (2010, October). Internet
Weekly News,839. Retrieved October 4, 2010, from Sciences Module. (Document ID: 2149693051).
Annotation: This article explained the benefits of cloud computing and iSheriff.

New York Institute of Technology; NYIT Combats Worldwide Security Issues at Cyber Security Conference.
(2010, October). Computers, Networks & Communications,120. Retrieved October 4, 2010, from Sciences Module. (Document ID: 2149820331).
Annotation: This article shared what was discussed at the first Cyber Security Conference on Sept. 15, 2010 regarding worldwide cyber security issues.

Schneier, B. (2009). The Invisible Battleground. Ripon Forum, 43(4), 12-13. Retrieved September 30, 2010, from ProQuest
Social Science Journals. (Document ID: 1907834621).
Annotation: This article delved into why malicious programs are so prevalent and what we can do to fight them.

Wagley, J. (2008, February). Winners in the Spyware Wars. Security Management, 52(2), 68. Retrieved October 4, 2010,
from ABI/INFORM Global. (Document ID: 1462453261).
Annotation: This article explained what the current status is regarding fighting spyware.

Graphics References

"A computer locked in chains" clip art located on the Project Title Page is obtained from Microsoft Office 2010 clip art collection (retrieved on 11/07/2010).
This picture is relevant because the project is all about online security and the many threats that exist on the internet.

"A sad face problematic computer" clip art located on the Introduction page is obtained from Microsoft Office 2010 clip art collection (retrieved on 11/07/2010).
This picture is relevant because the content paragraph it is before is discussing online security and how you can never truly be safe online.

"A devil ruining a computer" clip art located on the Background page is obtained from Microsoft Office 2010 clip art collection (retrieved on 11/07/2010).
This picture is relevant because the content paragraph it is before is discussing all of the different types of online threats there are these days and the evolution of such threats.

"A man holding a bandage" clip art located on the Background page is obtained from Microsoft Office 2010 clip art collection (retrieved on 11/07/2010).
This picture is relevant because the content paragraph it is before is discussing positives and solutions to online difficulties.

"Researcher thinking of possible solutions" clip art located on the Background page is obtained from Microsoft Office 2010 clip art collection (retrieved on 11/07/2010).
This picture is relevant because the content paragraph it is before is discussing what needs to be researched further in terms of fixing our online vulnerabilities.

"Man running through finish line" clip art located on the Background page is obtained from Microsoft Office 2010 clip art collection (retrieved on 11/07/2010).
This picture is relevant because the it is before the conclusion, the last content page.

"Two men shaking hands via a computer" clip art located on the Background page is obtained from Microsoft Office 2010 clip art collection (retrieved on 11/07/2010).
This picture is relevant because it signifies two people sharing information via a computer, which is fitting for a references page.