1. Alexander, D. (2013). Information security management principles. BCS, The Chartered Institute for IT.
2. Alto, P. (2020). Firewall feature overview datasheet [WWW Document]. Palo Alto Networks. URL https://www.paloaltonetworks.com/resources/datasheets/firewall-feature-overview-datasheet. Accessed 7.31.2020.
3. Ayodeji, A., Liu, Y., Chao, N., & Yang, L. (2020). A new perspective towards the development of robust data-driven intrusion detection for industrial control systems. Nuclear Engineering and Technology. https://doi.org/10.1016/j.net.2020.05.012
4. Baykara, M., & Das, R. (2018). A novel honeypot based security approach for real-time intrusion detection and prevention systems. Journal of Information Security and Applications, 41, 103–116. https://doi.org/10.1016/j.jisa.2018.06.004
5. Brende, B. (2020). The global risks report 2020 [WWW Document]. World Economic Forum. https://www.weforum.org/reports/the-global-risks-report-2020. Accessed 7.29.2020.