Have a personal or library account? Click to login
Cyber Security Cookbook for Practitioners Cover

References

  1. Morgan, S. (2015, November 24). IBM’s CEO On Hackers: ‘Cyber Crime Is The Greatest Threat To Every Company In The World’. Retrieved August 05, 2017, from https://www.forbes.com/sites/stevemorgan/2015/11/24/ibms-ceo-on-hackers-cyber-crime-is-the-greatest-threat-to-every-company-in-the-world/#75f85d3973f0
  2. Global Cost of Cybercrime Predicted to Hit $6 Trillion Annually By 2021, Study Says. (2016, August 16). Retrieved August 05, 2017, from http://www.darkreading.com/attacks-breaches/global-cost-of-cybercrime-predicted-to-hit-$6-trillion-annually-by-2021-study-says/d/d-id/1326742
  3. Cybersecurity Questions for CEOs. (n.d.). Retrieved August 5, 2017, from https://www.us-cert.gov/sites/default/files/publications/DHS-Cybersecurity-Questions-for-CEOs.pdf
  4. Fry, E. (2014, June 12). The 6 worst kinds of computer hackers. Retrieved August 05, 2017, from http://fortune.com/2013/02/26/the-6-worst-kinds-of-computer-hackers/
  5. M. (2016, October 24). 7 Types of Hacker Motivations. Retrieved August 05, 2017, from https://securingtomorrow.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations/
  6. Enterprise Risk Management Consequence and Likelihood Tables. (n.d.). Retrieved August 6, 2017, from https://ppl.app.uq.edu.au/sites/default/files/Risk%20Consequence%20and%20Likelihood %20Table%20-%20Form.pdf
  7. Touhill, Gregory J., and C. Joseph Touhill. Cybersecurity for Executives, Wiley, 2014. ProQuest Ebook Central, https://ebookcentral.proquest.com/lib/columbia/detail.action?docID=1707094.
  8. Wheeler, E. (2011), Security Risk Management, Chapter 8, Risk Evaluation and Mitigation Strategies, Elsevier Inc.
  9. Institute, F. (n.d.). FAIR, an international standard by the Open Group. Retrieved August 08, 2017, from http://www.fairinstitute.org/an-international-standard
  10. Deinert, A. (2016), “Cybersecurity Breach Playbook: What Every IT Administrator Needs to Know”, Vantage Point Solutions, Mitchell, SD
  11. Framework for Improving Critical Infrastructure Cybersecurity. (n.d.). Retrieved August 8, 2017, from
  12. https://www.bing.com/cr?IG=46B942FD8FD04ED7A2EF4DE7E061BAE0&CID=18B3474BBA4361240BCE4D93BB45607D&rd=1&h=qHbOGImxzOpDg5E54Eh7p9I1gen0wVXVy1g-wVCQk6w&v=1&r=https%3a%2f%2fwww.nist.gov%2fdocument-3766&p=DevEx,5063.1
  13. Cichonski, P. R., Millar, T., Grance, T., & Scarfone, K. (2017, February 19). Computer Security Incident Handling Guide. Retrieved August 08, 2017, from https://www.nist.gov/publications/computer-security-incident-handling-guide
  14. Cichonski, P. R., Millar, T., Grance, T., & Scarfone, K. (2017, February 19). Computer Security Incident Handling Guide. Retrieved August 08, 2017, from https://www.nist.gov/publications/computer-security-incident-handling-guide
  15. NIST. (2014, February 12) Retrieved from https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf
  16. Scholtz, T., McMillan, R. (2017, January 26). Institute Cybersecurity and Risk Governance Practices to Improve Information Security. Gartner.
  17. Kark, K., Francois, M., Aguas, T. (2016, July 25). The new CISO: Leading the strategic security organization. (n.d.). Retrieved August 09, 2017, from https://dupress.deloitte.com/dup-us-en/deloitte-review/issue-19/ciso-next-generation-strategic-security-organization.html
  18. Fry, E. (2014, June 12). The 6 worst kinds of computer hackers. Retrieved August 09, 2017, from http://fortune.com/2013/02/26/the-6-worst-kinds-of-computer-hackers/
  19. M. (2016, October 24). 7 Types of Hacker Motivations. Retrieved August 09, 2017, from https://securingtomorrow.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations/
  20. https://www.us-cert.gov/sites/default/files/publications/DHS-Cybersecurity-Questions-for-CEOs.pdf
  21. https://www.forbes.com/sites/stevemorgan/2015/11/24/ibms-ceo-on-hackers-cyber-crime-is-the-greatest-threat-to-every-company-in-the-world/#bfb909373f07
  22. http://www.darkreading.com/attacks-breaches/global-cost-of-cybercrime-predicted-to-hit-$6-trillion-annually-by-2021-study-says/d/d-id/1326742
  23. G. Eason, B. Noble, and I. N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529–551, April 1955. (references)
  24. J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.
  25. I. S. Jacobs and C. P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.
  26. K. Elissa, “Title of paper if known,” unpublished.
  27. R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press.
  28. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp. 740–741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982].
  29. M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989.
  30. Electronic Publication: Digital Object Identifiers (DOIs): Article in a journal:
  31. D. Kornack and P. Rakic, “Cell Proliferation without Neurogenesis in Adult Primate Neocortex,” Science, vol. 294, Dec. 2001, pp. 2127-2130, doi:10.1126/science.1065467.
  32. H. Goto, Y. Hasegawa, and M. Tanaka, “Efficient Scheduling Focusing on the Duality of MPL Representatives,” Proc. IEEE Symp. Computational Intelligence in Scheduling (SCIS 07), IEEE Press, Dec. 2007, pp. 57-64, doi:10.1109/SCIS.2007.357670.
Language: English
Page range: 88 - 105
Published on: Nov 11, 2019
Published by: Xi’an Technological University
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2019 Devesh Mishra, published by Xi’an Technological University
This work is licensed under the Creative Commons Attribution 4.0 License.