1. Allen L, Heriyanto T, Ali S (2014) Kali Linux—assuring security by penetration testing. Open Source, Birmingham
2. Banach Z (2019) Red team vs blue team testing for cybersecurity. https://www.netsparker.com/blog/web-security/red-team-vs-blue-team/. Accessed 19 May 2020
3. Bank of England (2020) Financial sector continuity. https://www.bankofengland.co.uk/financial-stability/financial-sector-continuity. Accessed 01 May 2020
4. Bank of England (2016) CBEST intelligence-led testing. CBEST implementation guide. Version 2.0. https://www.bankofengland.co.uk/-/media/boe/files/financial-stability/financial-sector-continuity/cbest-implementation-guide.pdf?fbclid=IwAR2RNdtW31hyHGc9ASvebR9McremNtVPiyvw06HPCESWAZhskrKLZdN-u0M. Accessed 16 Apr 2020
5. Bodeau DJ, McCollum CD, Fox DB (2018) Cyber threat modelling: survey, assessment, and representative framework. Department of Homeland Security