References
- Brasso, B. (2016, April 29). Cyber attacks against critical infrastructure are no longer just theories. Fire-Eye. Retrieved from https://www.fireeye.com/blog/executive-perspective/2016/04/cyber_attacks_agains.html
- Herjavec Group. (2019). The 2019 official annual cybercrime report. Retrieved from https://www.herjavecgroup.com/the-2019-official-annual-cybercrime-report/
- Laberis, B. (2016). 20 eye-opening cybercrime statistics. Security Intelligence, IBM. Retrieved from https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
- National Infrastructure Advisory Council (NIAC). (2018, December 11). Surviving a catastrophic power outage. Department of Homeland Security. Retrieved from https://www.dhs.gov/sites/default/files/publications/NIAC%20Catastrophic%20Power%20Outage%20Study_FINAL.pdf
- Privacy Rights Clearinghouse. (2015). A chronology of data breaches. San Diego, CA: PRC.
- Saltzer, J. H., & Schroeder, M. D., (1974, July 7). The protection of information in computer systems. Communications of the ACM 17.
- Saxe, J. G. The blind men and the elephant. The poems of John Godfrey Saxe. Retrieved from https://en.wikipedia.org/wiki/Wikisource
- Smith, A. (2014, November 21). China could shut down U.S. power grid with cyber attack, says NSA chief. Newsweek.
- TechTarget. (2018). Human attack surface. Whatis.com.
- Trend micro, report on cybersecurity and critical infrastructure in the Americas. (2015). Organization of American States, Trend Micro Incorporated.