1. "Computer Security." Encyclopedia of Management. 2009. Retrieved September 05, 2015 from
Encyclopedia.com:
http://www.encyclopedia.com/doc/1G2-3273100049.html2. "Top 10 Internet Threats." Norman A.S. Retrieved September 05, 2015 from
http://www.norman.com/home_and_small_office/security_center/internet_securi...3. "28 Types of Computer Security Threats and Risks." ITS Security Column, MMInc Digital LLC. 2015. Retrieved September 05, 2015 from
http://www.itscolumn.com/2012/03/28-types-of-computer-security-threats-and-...4. Rawlinson, Kristi. "Annual Study Reveals Average Cost of Cyber Crime Escalates 96 Percent to $12.7 Million per Organization." HP Computers Electronic Press Release. October 15, 2014. Retrieved September 05, 2015 from
http://www8.hp.com/us/en/hp-news/press-release.html?id=1815969#.VezAqflViko5. “What is a Firewall?” Indiana University. 2015. Retrieved September 05, 2015 from
https://kb.iu.edu/d/aoru6. “Security Awareness.” Information Technology Services at the University of Texas at Austin. October 5, 2010. Retrieved September 05, 2015 from
http://www.utexas.edu/its/secure/articles/firewalls.php7. Desmond, Michael. “What you should know about firewalls.” PC World. November 25, 2004. Retrieved September 05, 2015 from
http://www.pcworld.com/article/117557/article.html