References

Phishing¹ : https://www.sciencedirect.com/science/article/pii/S0268401225000519

Social Engineering¹ : https://www.mdpi.com/2076-3417/12/12/6042
Social Engineering² : https://www.cyber.gc.ca/en/guidance/social-engineering-itsap00166
Social Engineering³ : https://scholar.stjohns.edu/cgi/viewcontent.cgi?article=1100&context=jga

Malware & Viruses¹ : https://academic.oup.com/cybersecurity/article/4/1/tyy010/5262354

Man-in-the-Middle¹ : https://www.growingscience.com/ijds/Vol3/ijdns_2019_10.pdf
Man-in-the-Middle² : https://www.researchgate.net/publication/376271471_A_Deep_Dive_into_DNS_Spoofing_and_Security_Measures
Man-in-the-Middle³ : https://news.drweb.com/show/review/?lng=en&i=9779
Man-in-the-Middle⁴ : https://www.linkedin.com/pulse/hidden-dangers-public-wi-fi-how-stay-safe-open-networks-tomas-orth-fl7gf
Man-in-the-Middle⁵ : https://www.cisa.gov/news-events/alerts/2015/02/20/lenovo-superfish-adware-vulnerable-https-spoofing

Spyware¹ : https://www.cisa.gov/sites/default/files/publications/spywarehome_0905.pdf
Spyware² : https://consumer.ftc.gov/articles/stalkerware-what-know
Spyware³ : https://www.researchgate.net/publication/379600202_A_Comprehensive_Analysis_of_Pegasus_Spyware_and_Its_Implications_for_Digital_Privacy_and_Security

Passwords Basics¹ : https://aircconline.com/ijnsa/V17N2/17225ijnsa03.pdf

How Passwords Work¹ : https://www.linkedin.com/pulse/adobe-cyberattack-2013-case-study-bulitha-kawushika-hlrxc
How Passwords Work² : https://www.forbes.com/sites/daveywinder/2024/01/23/massive-26-billion-record-leak-dropbox-linkedin-twitterx-all-named/

Create Strong Passwords¹ : https://www.sciencedirect.com/science/article/pii/S0167404825002342
Create Strong Passwords² : https://arxiv.org/pdf/1411.7803

Multi-Factor Authentication¹ : https://www.cnbc.com/2025/11/23/passwords-corporate-cybersecurity-employee-authentication.html

Test Your Passwords¹ : https://www.kaspersky.com/blog/password-can-be-hacked-in-one-hour/51469/
Test Your Passwords² : https://www.ncsc.gov.uk/blog-post/problems-forcing-regular-password-expiry

Securing Your Computer¹ : https://www.sciencedirect.com/science/article/abs/pii/S0167404825000434

Securing Your Phone¹ : https://www.sciencedirect.com/science/article/pii/S0167404825000501
Securing Your Phone² : https://blog.apnic.net/2023/05/29/mitm-attacks-in-public-wi-fi-networks-without-rogue-access-points/
Securing Your Phone³ : https://www.mdpi.com/2079-9292/13/11/2117

Wi-Fi Security¹ : https://www.cisa.gov/news-events/news/securing-wireless-networks
Wi-Fi Security² : https://pmc.ncbi.nlm.nih.gov/articles/PMC8587628/
Wi-Fi Security³ : https://www.mdpi.com/2079-9292/13/16/3343

Maintaining Device Security¹ : https://www.researchgate.net/publication/391910669_The_Hidden_Dangers_of_Outdated_Software_A_Cyber_Security_Perspective

Virtual Private Networks¹ : https://www.mdpi.com/2078-2489/16/2/126

Firewalls¹ : https://www.mdpi.com/2624-800X/2/1/6
Firewalls² : https://outsourceitsecurity.com/firewalls-and-vpns-how-they-work-together-to-secure-remote-access

Networking Devices¹ : https://www.purkh.com/articles/understanding-routers-the-heart-of-modern-connectivity.pdf
Networking Devices² : https://www.irjmets.com/uploadedfiles/paper//issue_3_march_2024/50285/final/fin_irjmets1710007962.pdf
Networking Devices³ : https://www.fibermall.com/blog/switch-in-computer-network.htm?srsltid=AfmBOoq1I-g4MTGDs1Bqe9qg9fm-_nOJNO-PCBva9Ebe1svFwpuP82qA
Networking Devices⁴ : https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4289367
Networking Devices⁵ : https://www.flukenetworks.com/blog/cabling-chronicles/ethernet-cable-history