References - absentee-neptune/Senior-Capstone GitHub Wiki

Citations
[1] (Soh J, Copeland M, Puca A, Harris M. Microsoft Azure: Planning, Deploying, and Managing the Cloud. [Electronic Resource]. 2nd edition. Apress; 2020. Accessed September 17, 2020. http://search.ebscohost.com.cobalt.champlain.edu/login.aspx?direct=true&db=cat08107a&AN=cclc.b2026956&site=eds-live&scope=site)
This would be a good reference for setting up our cloud environment.
[2] (Doherty J, Anderson N, Clement N. Home Network Security Simplified. [Electronic Resource]. 1st edition. Cisco Press; 2006. Accessed September 17, 2020. http://search.ebscohost.com.cobalt.champlain.edu/login.aspx?direct=true&db=cat08107a&AN=cclc.b1884384&site=eds-live&scope=site)
This reference would help for when we have to secure the network and point us towards what to be wary of and what specifically to look for to lockdown.
[3] (Ruighaver, A. (2010). Organisational security requirements: An agile approach to Ubiquitous Information Security. Journal of Information Warfare, 9(1), 1-10. Retrieved September 17, 2020, from https://www.jstor.org/stable/26480486)
This reference would help to understand and evaluate the different requirements and challenges we may face in regards to information and how we analyze it.
[4] (Choi, J., Fershtman, C., & Gandal, N. (2010). NETWORK SECURITY: VULNERABILITIES AND DISCLOSURE POLICY. The Journal of Industrial Economics, 58(4), 868-894. Retrieved September 17, 2020, from http://www.jstor.org/stable/40985724)
This resource would help us to understand the disclosure policies for the information that we will be handling and making sure that we don't mishandle any information we view.
[5] Bada, M., & Nurse, J. R. (2020). The social and psychological impact of cyberattacks. In Emerging Cyber Threats and Cognitive Vulnerabilities (pp. 73-92). Academic Press. https://www.researchgate.net/publication/338313135_The_social_and_psychological_impact_of_cyberattacks
This resource would help us look at what some of the possibly social impacts of a cyberattack may look like, in regards to how it might effect peoples use of certain applications. This resource would be especially important in regard to those applications we use for doing school work, both educational and communications.
[6] Villamizar, M., Garcés, O., Ochoa, L., Castro, H., Salamanca, L., Verano, M., Casallas, R., Gil, S., Valencia, C., Zambrano, A., & Lang, M. (2017). Cost comparison of running web applications in the cloud using monolithic, microservice, and AWS Lambda architectures. Service Oriented Computing and Applications, 11(2), 233–247. https://doi.org/10.1007/s11761-017-0208-y
[7] Langat, P. K., Merwe, P. van der, Ikin, T., & Reader, H. C. (2011). CAT-7 Cable Evaluation for Square Kilometre Array Analogue Signal Transport. SAIEE Africa Research Journal, 102(1), 2–7. https://doi.org/10.23919/SAIEE.2011.8531562
[8] Villamizar, M., Garcés, O., Ochoa, L., Castro, H., Salamanca, L., Verano, M., Casallas, R., Gil, S., Valencia, C., Zambrano, A., & Lang, M. (2017). Cost comparison of running web applications in the cloud using monolithic, microservice, and AWS Lambda architectures. Service Oriented Computing and Applications, 11(2), 233–247. https://doi.org/10.1007/s11761-017-0208-y