1. Bejtlich R (2010) CIRT-level response to advanced persistent threat, 2010. Incident response plan, document version: 1.0.0, http://www.i-assure.com, “http://www.i-assure.com/wp-content/uploads/dlm.../RMF_Incident-Response-plan.docx” http://www.i-assure.com/wp-content/uploads/dlm.../RMF_Incident-Response-plan.docx, 2018.
2. Bellovin SM, Landau S, Lin HS (2017) Limiting the undesired impact of cyber weapons: technical requirements and policy implications. J Cybersecur 3(1):59–68. https://doi.org/10.1093/cybsec/tyx001
3. Campbell T (2003) An introduction to the Computer Security Incident Response Team (CSIRT) set-up and operational considerations, global information assurance certification paper, giac.org
4. Cichonski P, Millar T, Grance T (NIST), Scarfone K (Scarfone Cybersecurity) (2012) NIST Special publication 800-61, SP 800-61 Rev. 2, Computer security incident handling guide
5. GAO (2004) Information security technologies to secure federal systems, GAO report to congressional requesters, GAO-04-467, http://www.gao.gov, March 2004